Description:
The International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is an international refereed research journal that examines the growing issues of information security and privacy in a hyperconnected society. The journal integrates the disciplines of pervasive and ubiquitous... Show More
The International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is an international refereed research journal that examines the growing issues of information security and privacy in a hyperconnected society. The journal integrates the disciplines of pervasive and ubiquitous computing, the Internet of Things, wireless sensor networks, automatic identification, real-time localization, information processing, cloud computing, and mass data storage. The journal provides a forum to information technology educators, researchers, and practitioners to advance the practice and understanding of pervasive and ubiquitous computing and the challenges that arise in protecting and securing data. The journal features a major emphasis on how to realize pervasive and ubiquitous computing technology and how to build the system in applications. IJSPPC publishes full-length research papers, state-of-the-art reviews, insightful research and practice notes, case studies and book reviews from all areas of information security and privacy that are selected after a rigorous blind review by experts in the field.
Mission & Scope:
The mission of the International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is to ensure the security and privacy of personal information and data collected through combining evolving technologies and networking frameworks. Ubiquitous networking and pervasive computing are becoming more effective for solving intelligent systems–related problems, for example, intelligent... Show More
The mission of the International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is to ensure the security and privacy of personal information and data collected through combining evolving technologies and networking frameworks. Ubiquitous networking and pervasive computing are becoming more effective for solving intelligent systems–related problems, for example, intelligent security, intelligent transportation, intelligent environmental protection, intelligent logistics, and so forth. Ubiquitous computing connects not only networked terminals like mobile phones, computers, smart devices, but also daily life objects that have been considered just “un-networked things” or “inert objects”. This increasing connectiveness provides more accessibility to information, making it imperative that best practices in securing data are implemented and followed. This journal encourages the further development of tools and techniques, and discusses strategies to secure information shared across the Internet of Things, wireless networks, etc.
Coverage:
- Analysis of pervasive work environments
- Applications of context sensitive and location aware
- Applications of middleware for organizational pervasive computing environments
- Applications of near field communication (NFC) in finance systems
- Applications of pervasive computing in healthcare environments
- Applications of pervasive computing in public environments
- Applications of smart office appliance systems
- Applications of software development in pervasive computing environments
- Applications of XML to model smart environments
- Banking and fraud prevention measures enabled by personal computing technical innovation
- Data Privacy
- Fault tolerant pervasive computing environments
- Identification of development standard requirements in pervasive computing environments
- Implications for data repositories in pervasive computing organizational environments
- Implications for data warehousing and data mining in pervasive computing environments
- Implications for governance in pervasive computing environments
- Implications for human interface development in pervasive computing environments
- Implications for information systems ethical and moral guidelines in pervasive computing environments
- Implications for systems design and development practice in pervasive computing environments
- Integration of pervasive computing work environments (RFID, MOTES, and PIC)
- Models of accessing and using ambient information
- New approaches to data modeling in ubiquitous computing environments
- Pervasive computing architecture development
- Pervasive computing architectures
- Pervasive computing infrastructure development
- Pervasive pheromone-based systems models
- Role of the Internet in pervasive computing environments
- Security implications for pervasive work environments
- Theoretical development of pervasive computing systems
- Theoretical development of the nomadic nature of work environments
IGI Global holds its journals to the highest ethical practices.
View Full Editorial PolicyArticle Processing Charge (APC):
Payment of the APC fee (directly to the publisher) by the author or a funding body is not required until AFTER the manuscript has gone through
the full double-anonymized peer review process and the Editor(s)-in-Chief at his/her/their full discretion has/have decided to accept the manuscript based
on the results of the double-anonymized peer review process.
What Does IGI Global's Open Access APC Cover?
In the traditional subscription-based model, the cost to the publisher to produce each article is covered by the revenue generated by journal subscriptions.
Under OA, all the articles are published under a Creative Commons (CC BY) license; therefore, the authors or funding body will pay a one-time
article processing charge (APC) to offset the costs of all of the activities associated with the publication of the article manuscript, including:
- Digital tools used to support the manuscript management and review process
- Typesetting, formatting and layout
- Online hosting
- Submission of the journal's content to numerous abstracts, directories, and indexes
- Third-party software (e.g. plagiarism checks)
- Editorial support which includes manuscript tracking, communications, submission guideline checks, and communications with authors and reviewers
- All promotional support and activities which include metadata distribution, press releases, promotional communications, web content, ads, fliers, brochures, postcards, etc. for the journal and its published contents
- The fact that all published articles will be freely accessible and able to be posted and disseminated widely by
the authors - Professional line-by-line English language copy editing and proofreading*
*This service is only performed on article manuscripts with fully paid (not discounted or waived) APC fees.
APC Subsidizing and Funding
To assist researchers in covering the costs of the APC in OA publishing, there are various sources of OA funding.
Additionally, unlike many other publishers, IGI Global offers flexible subsidies, 100% Open Access APC funding, discounts, and more.
Learn More
IGI Global recognizes that many researchers may not know where to begin when searching for OA funding opportunities. IGI Global recently launched an
Open Access Funding Resources page for researchers to browse.
This page provides a comprehensive list of OA funding sources available for researchers to secure funds for their various OA publications.
This journal is currently actively seeking new submissions. Interested authors should ensure that their article manuscript adheres to the journal's
submission guidelines
and
before you write page,
which include originality of the manuscript, APA formatting information and examples, manuscript requirements, and more. To submit an article for consideration,
please begin the submission process below.
All inquiries regarding IJSPPC should be directed to the attention of:
Submission-Related InquiriesTao Gao
Editor-in-Chief
International Journal of Security and Privacy in Pervasive Computing (IJSPPC)
Email:
ijsppc@igi-global.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in
IGI Global's InfoSci® platform.
The International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is owned and published by IGI Global.
International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is editorially independent, with full authority of the journal's content falling to the Editor-in-Chief and the journal's
Editorial Board.
The In-House Editorial Office manages the publishing operations of the journal.
IGI Global
701 East Chocolate Avenue
Hershey, PA 17033
USA
Principal Contact
Grace Long
Managing Editor of Journal Development
IGI Global
Phone: (717) 533-8845 ext. 147
E-mail: glong@igi-global.com
Support Contact
Marissa Massare
Development Editor - International Journal of Security and Privacy in Pervasive Computing (IJSPPC)
IGI Global
Phone: 717-533-8845
E-mail: mmassare@igi-global.com