Journal of Information, Data, and Security Trends


Aims and Scope

JIDST covers research in information security, data science, and related trends, including cybersecurity, data privacy, data analytics, risk management, and emerging technologies in security.

Scope of the journal

The "Journal of Information, Data, and Security Trends" typically focuses on research and advancements in the interdisciplinary field of information security, data science, and related trends. Its aims and scope generally include, but are not limited to, the following:

  • Information Security: The journal covers various aspects of information security, including but not limited to cybersecurity threats, vulnerabilities, attacks, and defense mechanisms. This encompasses research on network security, cryptography, secure communication protocols, access control, intrusion detection and prevention systems, and security management.
  • Data Privacy and Protection: Journal of Information, Data, and Security Trends publishes research on methods and techniques for protecting sensitive data and ensuring privacy in information systems. This includes topics such as data anonymization, privacy-preserving data mining, privacy-enhancing technology and data sharing framework.
  • Data Science and Analytics: The journal encompasses research on data science methodologies, techniques, and tools for analyzing and extracting insights from large-scale datasets. This includes topics such as data mining, machine learning, statistical analysis, big data analytics, predictive modeling, and data visualization.
  • Secure Data Management: Journal of Information, Data, and Security Trends may feature research on secure data management techniques and technologies. This includes research on secure databases, data integrity, data provenance, data sharing, data storage security, and secure data outsourcing.
  • Emerging Trends and Technologies: The journal covers emerging trends and technologies in information security and data science. This includes topics such as blockchain technology for secure data transactions, secure multi-party computation, homomorphic encryption, federated learning, and AI-driven security solutions.
  • Risk Management and Compliance: Journal of Information, Data, and Security Trends includes research on risk management frameworks, methodologies, and tools for assessing and mitigating cybersecurity risks. 
  • Cyber Threat Intelligence: The journal may feature research on cyber threat intelligence techniques and practices for identifying, analyzing, and mitigating cyber threats. This includes topics such as threat intelligence sharing, threat hunting, malware analysis, and cyber threat modeling.
  • Cybersecurity Education and Awareness: Journal of Information, Data, and Security Trends may include studies on cybersecurity education, training, and awareness programs. This encompasses research on effective strategies for cybersecurity awareness campaigns, cybersecurity curriculum development, and professional certifications in cybersecurity.

Overall, the Journal of Information, Data, and Security Trends serves as a platform for researchers, practitioners, policymakers, and educators to disseminate their original research findings, exchange ideas, and contribute to the advancement of knowledge in the interdisciplinary field of information security, data science, and related trends.

Editor-In-Chief:

Dr. Velliangiri Sarveshwaran
Assistant Professor,
Department of Computational Intelligence,
SRM Institute of Science and Technology,
Kattankulathur Campus, Chennai. - 600089
vellians@srmist.edu.in,vellingiri@ccu.edu.tw

Editor:
Dr.Santosh Reddy Addula
Department of Information Technology
University of the Cumberlands
Williamsburg, KY, USA.
santoshaddulait@gmail.com
 
Dr. Kalimullah Lone
Guest Faculty
Department of Information Technology
National Institute of Technology, Srinagar
Hazratbal, Srinagar, Jammu and Kashmir
India-190006

​​Instructions for Authors

Authors are advised to carefully read the instructions provided on this page before submitting their papers to the journal. It is essential to adhere to the Manuscript Guiding Principles outlined here. Submissions are only accepted online.

Submission

Authors affirm that their paper has not been submitted for review or published elsewhere, either partially or fully. Permission from the copyright holder is required before publishing the paper in other languages.

Instructions

Authors are responsible for the content, including text, tables, and figures, unless explicit permission is obtained from the copyright holder of previously published material.

Submission of a paper indicates that authors are knowledgeable about copyright policies, journal guidelines, terms and conditions, as well as scientific and publishing ethics.

Plagiarism

Submitted manuscripts undergo a screening process for plagiarism. Plagiarism in any form is a serious breach of scholarly integrity and will not be tolerated.

Examples of plagiarism include:
  • Failure to acknowledge the source when using unique concepts or phrases from another paper.
  • Paraphrasing someone else's idea without proper attribution.
  • Submitting the same or similar manuscript to multiple publications simultaneously (self-plagiarism).
  • Copying sections from other manuscripts without proper citation.
  • Attributing sources falsely.
  • Multiple submission of a paper without prior approval.
Responsibilities

Authors must prepare manuscripts according to the format provided in the instructions and ensure technical and grammatical correctness.

The publisher reserves the right to re-review or reject manuscripts that are unsuitable for publication or do not meet the defined criteria.

Authors must be the copyright owner and able to sign the Author Agreement. Manuscripts should be formally withdrawn before submission to another journal.

Copyright

Authors submit a "copyright agreement form" upon manuscript acceptance. Detailed information regarding copyright transfer is sent via email to the corresponding author.

The corresponding author sends back the copyright form with a digital signature.

Reference

Upon article acceptance, the corresponding author receives an electronic version of the published article with a digital watermark.

Printed versions of the corresponding issue are available for purchase at a fixed cost, upon author request.

Ethical Statements

By submitting manuscripts to Journal of Information, Data, and Security Trends, the journal, authors assure the following ethical statements:

  • Manuscripts are based on the authors' original research, not previously published or under consideration elsewhere.
  • The research and analysis are complete, fair, and truthful.
  • The manuscript complies with copyright laws, with all content properly cited.
  • Proper attribution is given when copying content from other publications.
  • Authorship is defined truthfully based on contributions to the research.
  • Authors are responsible for any violations of copyright laws, misconduct, or unethical practices.
  • Violations may result in severe consequences, including retraction of published content.
  • Authors are expected to adhere to ethical publication practices as per the Committee on Publication Ethics (COPE) guidelines.

Indexing

Google scholar

DOI

Crossref

CiteFactor

Archive

Contact us

3rd Floor, Rathi Plaza, Opp. to Govt. Hospital,
Thuckalay-629175,
Kanyakumari, Tamil Nadu, India.

publication@skilldux.com
logo-dark

Contact Us

Address
:
SkillDux Edutech Private Limited,
3rd floor, Rathi plaza,
Opp. Govt Hospital,
Thuckalay, Nagercoil, Tamil Nadu, India.

Copyright 2024 SkillDux. All Rights Reserved