Cybersecurity Perspectives

Aim

AICL’s Cybersecurity Perspectives serves as a forum for contemporary issues regarding cybersecurity leadership in the digital society. The aim of this journal is to provide meaningful dialogue to address cybersecurity, information privacy and digital ethics issues at the organizational and societal levels.

Scope

We seek to achieve this objective by publishing articles that: 

(1) provide innovative solutions and recommendations to well-known and emerging cybersecurity issues, 

(2) address controversial and interdisciplinary approaches, and 

(3) provide solutions to cybersecurity and privacy issues at the organizational and societal level based on established research.

Dialogue

We encourage ideas in the developmental stages. Our endeavor is to provide a platform to share diverse viewpoints on established and controversial cybersecurity and information privacy topics. 

Journal Categories

Cybersecurity Perspectives categories are focused on initiating dialogue on extant challenges of the field and providing recommendations to ensure safer digital society. 


The journal invites contributions in three categories: 

C-Suite Perspectives, Industry Perspectives, and Research Perspectives.

C-Suite Perspectives

This category is focused on Board, Executive or C-level viewpoint on managing cybersecurity, ensuring privacy, or confronting ethical concerns – the challenges, constraints, and innovative practices.

Industry Perspectives

This section focuses mainly on cybersecurity issues affecting industry practices and/or societal outcomes. 

Research Perspectives

This category is focused on bridging the implications of cybersecurity research into practical principles for industry and societal use. 

Under these three categories, we encourage authors to consider following  (but not limited to) types of papers.

Position Papers

Opinionated pieces on practices or issues regarding cybersecurity, information privacy or digital ethics. 

Case Studies

Case studies of organizational practices or societal problems on cybersecurity, information privacy, or digital ethics. 

Reviews

Reviews of best practices, technologies, regulations or standards for cybersecurity or information privacy.

Implications

Recommendations or implications of emergent technologies on safety of Digital Society.

Publication

Open Access

We follow Budapest Open Access Initiative (BOAI) funding model in that it all content is freely available to individuals and institutions without an embargo period. 

What is open access?

Here is the definition of "open access" from the BOAI: "By 'open access' to this literature, we mean its free availability on the public internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of these articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. The only constraint on reproduction and distribution, and the only role for copyright in this domain, should be to give authors control over the integrity of their work and the right to be properly acknowledged and cited."

Access to Papers

You may access all papers published in Cybersecurity Perspectives by clicking on the button below. 

Editorial Team

Published Work

Guimaraes (2019)

image4

Research Perspective 

Trust and Mistrust: Are Regulations and Standards Addressing Both Elements for E-Commerce to Thrive?

Hicks (2019)

image5

C-Suite Perspective

Employee Cyber Security Awareness Training Matters


Sedlack (2019)

image6

Research Perspective

Toward an Improved Business Information Security Posture

Acceptance and Copyright

Review of Manuscript

Manuscripts will be accepted on the basis of the contribution, in particular, implications or recommendations towards organizational or societal issues concerning digital society. Manuscripts are reviewed by the editorial team for acceptance before publication. 


The editorial team consists of experts in the field, which includes individuals with doctoral degrees, as well as, C-level executives with extensive cybersecurity and information privacy experience. We reserve the right to recommend or reject revisions of the manuscript provided there are justifiable reasons, such as inconsistency of article, lack of contribution, or plagiarism issues. 


Copyright Policy

All work published by Cybersecurity Perspectives is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License. You may find additional information about the license at the following link: https://creativecommons.org/licenses/by-nd/4.0

image7

Author Guidelines

Authors must submit manuscripts in MS Word (.doc or .docx) format to submit@americascyber.org. All manuscripts must adhere to the following:


1.  Length of the paper:  Maximum page limit listed below includes references and appendices

  • C-Suite Perspectives: 8 pages
  • Industry Perspectives: 8 pages
  • Research Perspectives: 12 pages


2.  Proper sectioning of manuscript. Authors can section manuscript as desired, but must contain an abstract, introduction, and conclusion. The conclusion section should clearly highlight the implications or recommendations of the paper.


3.  Body of the Paper: The general text of the paper, excluding headings and title, should be written with following format specifications:

  • Font: Times New Roman
  • Font Size: 12, regular
  • Line spacing: 1.5-point line spaced
  • Alignment: left
  • Margins (inches): Left: 1; Right: 1; Top: 1; Bottom: 1


4.  Figures and Tables: These should be properly numbered. 

  • Figure labels at bottom of figure.
  • Table labels at top of table.


5.  Reference Style: Please use American Psychological Association (APA) format for the paper and references.


6. Page Numbers: Please enter page number as footer for each page.

  • Page numbers should be at the bottom right of the page 
  • Page numbers should follow the same font style and size as text.

image8