International Journal of Innovative Computing, Information and Control (IJICIC)
ISSN 1349-418X


Special Issue on Decision Making on Information Security Strategy and Technology

Editor(s): Prof. Sangkyun Kim, Ph.D
Department of Industrial Engineering
Kangwon National University, Korea
E-mail: saviour@kangwon.ac.kr


Call for Papers

An information security strategy is a plan of action designed to minimize the risk in information environments while complying with legal, contractual, and organizational requirements. To achieve the specific goal of the security strategy, the selection and introduction of the security technology should be conducted efficiently. This special issue aims to solve the difficult problems that decision analysts and decision makers easily face in information environments when they try to make a decision on information security strategy and technology by providing practical and well-focused research results based on the decision theory and information technology.

Topics of interests focus on, but are not limited to:
Evaluation or assessment models for the security strategy and systems
Investment decision on the security systems and technology
Strategy planning for the security systems and technology
Group decision process and models for the complex decision on security issues
Case studies on decision making on the security strategy and technology
Legal or ethical issues in information security strategy and technology

Important dates for the special issue:
Due date for prospective papers: 31 July 2011
Notification of first round review: 30 September 2011
Due date of revised manuscripts: 31 October 2011
Final notification: 15 December 2011
Publication: To be determined by IJICIC Editorial Office

Submission guideline:
All papers should be submitted in PDF or Word format via e-mail to the Guest Editor, Prof Sangkyun Kim (saviour@kangwon.ac.kr).

Reviewing process:
The Guest Editor will make an initial determination of the suitability of the manuscript. Papers that lack clarity in presentation or are outside the scope of the special issue will not be sent for review. Otherwise, the manuscript will be sent to at least three competent referees. Based on reviews, the Guest Editor will determine whether the manuscript should be accepted, accept with minor revision, accept with major revision or rejected. Then the Guest Editor will recommend all acceptable papers to the Editor-in-Chief, who will make a final publication decision and inform the authors by the journal office.

Publication guideline:
A submitted paper(s) must not have been previously published or be currently under consideration for publication elsewhere. According to the journal policy, page charges will be applied to all accepted papers to cover partial cost for publication.

For more information, please contact IJICIC Editorial Office, office@ijicic.org or the Guest Editor:



Special Issue on Intelligent and Innovative Computing in Business Process Management

Call for Papers

Editor(s):Prof. Hyerim Bae, Pusan National University, Korea

Prof. Dongsoo Kim, Soongsil University, Korea

Prof. Ling Liu, Georgia Institute of Technology, USA

Prof. Hajo A. Reijers, Eindhoven University of Technology, Netherlands




Special Issue on Advances on Computational Intelligence and Information Security

Editor(s):Prof. Hailin Liu (lhl@scnu.edu.cn), China

Prof. Yiu-ming Cheung (ymc@comp.hkbu.edu.hk), China

Prof. Yuping Wang (ywang@xidian.edu.cn), China

Prof. Mingqing Xiao (mxiao@siu.edu), USA


With the rapid growth of communication through internet, information processing and management are becoming more and more challenging. One critical issue is how to find effective ways to protect information systems, networks and sensitive data within our communication systems. Traditional techniques such as well-selected passwords and change of file permission are far from being enough to meet today's security requirement. Additional effort deems to be necessary and new techniques are being highly demanded to ensure a safe and secure information environment.

Computational intelligence has emerged as powerful tools for information processing, decision making, and knowledge management. The techniques of computational intelligence have been successfully developed in areas such as neurocomputing, fuzzy systems, evolutionary algorithms, data minding, Web service, multi-agent systems, etc. It is predictable that in the near future computational intelligence will play more and more critical role in tackling the issues of information security.

This special issue will focus on the issues in computational intelligence and information security. Topics include, but not limited to, the issues in information security such as data minding with security protection, evolutionary algorithms, fuzzy systems, image and signal processing, multi-agent systems, neural network, pattern recognition, watermarking, and Web service.

The intention for this special issue is (i) to present the state-of-art methodology in the field of computational intelligence; (ii) to promote the research in dealing with information security problems by using various computational intelligence techniques.

Papers should be submitted to one of above guest editors by emailing the PDF file by December 30, 2010 and will be required to go through the regular journal review process. Manuscript layout requirement can be found at http://www.ijicic.org/information.htm.


Copyright (c) Since 2004 ICIC International, All rights reserved.