We use cookies to improve your website experience. To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy. By closing this message, you are consenting to our use of cookies.

Enterprise Information Systems

Contribute to our special issue on Security, Privacy and Forensics in Enterprise Information Systems

Deadline: 15 April 2019

Distributed information systems and their management has become a reality of today’s enterprises. Adoption of different computing and communication technologies has become a key strategy for many enterprises to manage their data. These facilitate efficient computing for the use of information. With the convergence of ubiquitous mobility, inexpensive computing and virtualization technologies in IT infrastructure, numerous cost-effective and highly interactive business applications and services are coming into picture. However, this rapid development is raising demand for enforcing considerable novel security controls and best practices in order to ensure the security and the privacy of Enterprise Information Systems (EIS).

Security of EIS covers a wide range of terms in order to help information security professionals to deal with the expanding nature of risks and unknown hurdles in the way. Wide use of remote services is characterized using knowledge tools to support productivity. Corporate applications are also used to populate diverse characteristics but should not contain personally identifiable information. Mature businesses are adopting novel computing models in business-critical functionalities, such as logistics, purchasing and document management. In such cases, the applications are accessed by the users, and data including personal and sensitive information is stored remotely, such as over the Cloud, which requires flexibility and lower cost of maintenance. Because of new computing models, ensuring security at all levels including host, network, data and application, is a key concern for the enterprise individuals. Newer models are cost effective, but they are susceptible to vulnerabilities, malicious software, cyber-terrorists, hackers and cyber attacks, that can steal private information and can disrupt services in order to harm the enterprise network.

Security management has become a critical area in the internet economy. Enterprises are under constant pressure to demonstrate that the methods adopted by them are reliable enough to protect the data assets. Managing security within an enterprise requires statistical measurement. IT metrics provide a way to assess current security status in order to develop best practices for functioning and guiding future research associated with the establishment of security. They help in prioritizing threats and vulnerabilities based on the statistical measurement. Within an organization, IT security metrics can be adopted at different levels which provide a complete picture of the baseline measurements and meta-data information for the interpretation of results. Lower level metrics can be collected, aggregated and mapped to progressively higher levels, based on the complexity and size of the organization. Key characteristics of effective metrics include measurability, comparability, goal-oriented, time-dependent, and specificity.

This special issue focuses on the security, privacy and forensics of enterprise information systems, addressing both original algorithmic development and new applications. We are soliciting original contributions from leading researchers and practitioners in academia as well as industry, which address a wide range of theoretical and application issues in security, privacy and forensics in the enterprise information systems.

Enterprise Information Systems

Language: en-US

Publisher: tandf

Visit Journal Articles

Coherent list of Topics

Papers must be tailored to the emerging fields of Security, Privacy and Forensics in the Enterprise Information Systems through deployments models, challenges and novel solutions. The editors maintain the right to reject papers they deem to be out of scope of this special issue. Only original, unpublished contributions and invited articles will be considered for the issue. The papers should be formatted according to the journal guidelines.

Dates for your diary:

  • Manuscripts Due: April 15, 2019
  • First Decision Date: July 15, 2019
  • Revision Due: September 15, 2019
  • Final Decision Date: End of November, 2019

Editorial information

  • Guest Editor: B. B. Gupta, National Institute of Technology, Kurukshetra, India (bbgupta@nitkkr.ac.in)
  • Guest Editor: Dharma P. Agrawal, University of Cincinnati, Cincinnati, USA (dpa@cs.uc.edu)