Call for Chapter Proposal

Handbook of Research on Threat Management and
Information Security: Models for Countering Attacks, Breaches and

Publishers: IGI Global - (Disseminator of Knowledge Since 1988)
(formerly "Idea Group Inc.")
701 E. Chocolate Avenue., Suite 200
Hershey, Pennsylvania 17033, USA


Increasingly, the global society is adapting to the computerized information systems for all data and information transactions. People tend to store all their personal, business and public information on the web for enhanced storage, search and access. While society relies on web and computerized information storage, attackers misuse the technology and secure the sensitive information. To prevent such attacks, information security researchers have developed mechanisms and technology to protect data loss and intrusion. Intrusion and prevention are on-going processes and technology development reflects upon these operations. Users need to understand the data protection mechanisms comprehensively. Comprehensive knowledge on information security is required not only for researchers and practitioners, but also for policy makers, system managers, owners and administrators. The process of building and imparting information security knowledge is possible through the creation of a comprehensive collection of research on the topic.. Unfortunately, such a collection of research on security does not exist. The forthcoming handbook on Information Security will address significant issues in the field.

Submission and Review Process

Researchers and practitioners are invited to submit a 2-5 page manuscript proposal clearly explaining the objective and concerns of the proposed chapter on or before June 10. Authors of accepted proposals will be notified about the status of their proposals and sent chapter organizational guidelines. Full chapters should be about 8,000-10,000 words in length and expected to be submitted by October 15, 2008.

All chapters will be subject to a double-blind peer review process.

The proposed handbook would address the following titles, but not limited.

Access Control
Accounting and Audit
Anonymity and Pseudonymity
Applied Cryptography
Application Security
Attacks and Prevention of Online Fraud
Authentication and Non-repudiation
Computer crimes
Content dependant access control
Cryptographic Protocols and Functions
Cyber attacks
Database Security
Data-loss prevention
Design and Analysis of Cryptographic Algorithms
Digital Certificates
Digital Rights Management
Economics of Security and Privacy
Email Security
Encryption standards
Firewall Management
Formal Methods in Security
Foundations of Computer Security
GSM/3G Devices
Identity and Trust Management
Image-based spams
Information Hiding and Watermarking
Infrastructure Security
Information Phising
Information Security Training
Insiders Threat Management
Intrusion Detection, Tolerance and Prevention
Mobile, Ad Hoc and Sensor Network Security
Network and Wireless Network Security
Peer-to-Peer Network Security
Private Searches
Instant Message Security
Integrated Trust Management
Patch Management
Risk Management
Role Based Access Control Models
Security Audit
Security and Ontology
Security Architectures
Security Intelligence
Security and Privacy in Pervasive/Ubiquitous Computing
Security in Information Flow
Security for Mobile Code
Security of Grid Computing
Security of eCommerce, eBusiness and eGovernment
Security Toolkit
Security Modeling and Architectures
Security Models for Ambient Intelligence environments
Security Policies and Standards
SSL Technology
Storage Security
Trusted Computing
Usable Security
Virus Protection
Vulnerability Assessment Management
Wireless network security

Important Dates

Submission of Proposals:
5 July 2008
Selection of Proposals:
30 July 2008
Preliminary review and revision:
15 August 2008
Second Review and Revision:
30 Aug 2008
Camera ready chapters:
15 Oct 2008

For proposal submission click here

Download sample chapter click here

Editor: Pit Pichappan
Faculty of Computer and Information Sciencesv AISB University
Saudi Arabia
Journal of Digital Information Management
Email: ,

This page was updated on September 20, 2008