Aims & Scope
The Computer Fraud and Security Journal (CFS) aims to advance the field of cybersecurity and fraud prevention through the dissemination of high-quality, peer-reviewed research. Our goal is to foster a deeper understanding of the complexities and challenges associated with digital security, and to promote the development of innovative solutions and strategies for combating cyber threats. We are committed to providing a forum for scholarly discussion and practical application that bridges the gap between theoretical research and real-world practices.
Scope
CFS covers a broad range of topics within the domain of computer fraud and security. Our scope includes, but is not limited to:
-
Cybersecurity Threats and Attacks:
- Analysis of emerging threats and attack vectors.
- Research on malware, ransomware, phishing, and other forms of cybercrime.
- Studies on advanced persistent threats (APTs) and their mitigation.
-
Fraud Prevention and Detection:
- Techniques and technologies for preventing and detecting fraudulent activities.
- Research on identity theft, financial fraud, and insider threats.
- Case studies and methodologies for fraud detection and response.
-
Security Technologies and Solutions:
- Development and evaluation of security tools and technologies.
- Innovations in encryption, authentication, and access control.
- Advances in intrusion detection systems (IDS) and security information and event management (SIEM).
-
Policy and Regulation:
- Examination of cybersecurity policies, regulations, and compliance issues.
- Impact of legal frameworks on cybersecurity practices.
- Discussions on international standards and cooperation in cybersecurity.
-
Cybersecurity Education and Training:
- Research on cybersecurity education methods and curricula.
- Development of training programs for security professionals.
- Studies on skills gaps and workforce development in cybersecurity.
-
Emerging Trends and Future Directions:
- Exploration of new and evolving technologies such as artificial intelligence, blockchain, and the Internet of Things (IoT) in the context of cybersecurity.
- Analysis of future challenges and opportunities in the field of digital security.
Types of Contributions
CFS welcomes a variety of contributions, including:
- Original Research Articles: Detailed studies presenting novel research findings and methodologies.
- Review Articles: Comprehensive reviews summarizing current knowledge and identifying future research directions.
- Case Studies: In-depth examinations of specific incidents or implementations in the field of computer fraud and security.
- Technical Notes: Brief reports on emerging technologies, trends, or techniques relevant to cybersecurity.
Audience
Our journal serves a diverse audience, including researchers, academics, industry professionals, policymakers, and students. We aim to provide valuable insights that are both academically rigorous and practically relevant, catering to the needs of all stakeholders involved in the field of computer fraud and security.
Submission Guidelines
We invite authors to submit their manuscripts in accordance with our submission guidelines, available on our website. All submissions undergo a rigorous peer-review process to ensure the highest standards of quality and relevance.