- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
Cybersecurity versus Information Privacy in Networked Services
Call for Papers
Today, undemocratic nations/states often employ censorship techniques to monitor citizens and selectively block Internet services. As a response, censorship and monitoring circumvention systems and methodologies, mostly based on anonymization and obfuscation, have been proposed by the research community as a means of bypassing Internet censorship exercised by totalitarian regimes and thus enhancing the privacy of individuals.
Furthermore, cybercrime is a danger that continues to increase with very serious implications in the worldwide economy and the societies of developed and developing countries. Most cyber criminals employ anonymization tools and methodologies to hide their traces or erase them after an attack. As a response, a main goal of forensic investigations is to trace incidents against the cybersecurity of organizations or the safety of online citizens. Moreover, lawful interception of online communications is systematically performed in democratic nations/states as a proactive measure against criminal offenses (e.g., terrorism).
Information privacy and information security therefore are often contradictory and can largely be seen as double-edged swords. Specifically, there is a clear intersection between anonymization techniques, tools, and policies that may be used in the name of freedom of speech and open access to information in the Internet, on one hand, while on the other hand the same or similar tools, techniques, and policies may be exploited by terrorists and cybercrime actors. Moreover, there is a similarity between methods, tools, and policies employed by censoring regimes (e.g., intercepting, fingerprinting, and detecting connections to forbidden providers) and those employed by forensic and/or law enforcing authorities in democratic nations/states (e.g., tracing a cybercrime, lawful interceptions of a suspect’s online communications).
This special issue calls for high-quality original papers that contribute to the understanding of the contradictory aspects of information privacy and information security in Internet communications and online services from a technical, organizational, and human perspective. Both theoretical and empirical analyses are welcomed, including, but not limited to, conceptual papers, theories and theoretical models, quantitative and qualitative empirical studies, and software development and validation.
Potential topics include but are not limited to the following:
- Organizational issues on cybersecurity protection and incident analysis
- Network forensics and cybercrime
- Cybercrime and cybercrime investigation policies
- Information privacy techniques against censorship in news, blogs, and fora
- Deanonymization, attack, and threat attribution
- Anonymous social media services
- Lawful interceptions of Internet services
- Privacy versus accountability tradeoffs in Internet communications
- Anonymization and darknet
- Security and privacy measurements in networked services
- Privacy enhancing policies
- Anonymization and anonymity services
Authors can submit their manuscripts through the Manuscript Tracking System at http://mts.hindawi.com/submit/journals/scn/csvi/.
|Manuscript Due||Friday, 14 April 2017|
|First Round of Reviews||Friday, 7 July 2017|
|Publication Date||Friday, 1 September 2017|
Lead Guest Editor
- Phivos Mylonas, Ionian University, Corfu, Greece