Cybersecurity in Information Systems and Technology

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (31 December 2021) | Viewed by 11741

Special Issue Editors


E-Mail Website
Guest Editor
Computer Science Department, Universidad de Málaga, 29071 Malaga, Spain
Interests: critical infrastructure protection; security in Industry 4.0 and smart grids/microgrid; security in Industrial Internet of Things (IIoT) and digital twins; prevention, detection and response to advanced and persistent attacks

E-Mail Website
Guest Editor
Department of Mathematics, Universidad de León, 24071 León, Spain
Interests: data science in cybersecurity; mathematical models; cybersecurity data and information quality; teaching and training in cybersecurity

E-Mail Website
Guest Editor
Alarcos Research Group, University of Castilla – La Mancha, 13070 Ciudad Real, Spain
Interests: security by design; security patterns; information systems risk analysis and management; blockchain; quantum-based security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
GSyA Research Group, University of Castilla–La Mancha, 13700 Ciudad Real, Spain
Interests: security patterns; security engineering; security in cloud computing and big data; secure information systems; security technology
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Concepts such as cybersecurity and cyber defense are becoming increasingly common in a society dominated by digital technology. In an ever-changing world where digitalization reaches all areas, cybersecurity has become a major necessity, as it poses a major risk to the sustainability of companies and their assets. In societies where banking, government, energy, transport, transportation, hospitals, etc., are handled by digital technology, securing these services and having appropriate mechanisms is critical.

Therefore, the security of information systems has become one of the most important aspects to be taken into account in the last decade and, to a large extent, for complex organizations that are characterized by a considerable volume of geographically distributed systems connected by the Internet. This is because such companies are more exposed to a huge increase in attacks aimed at stealing information assets, on the one hand, and, on the other hand, at extracting the maximum economic benefit from them. There are numerous threats to the information systems of organizations, such as cyber-attacks by cyber-terrorists, hackers, etc., viruses that spread through the Internet, social engineering attacks (e.g., phishing, among others), and even inappropriate use of information assets by employees of the organizations themselves.

Proposals for this Special Issue on ''Cybersecurity in Information Systems and Technology'' are requested to represent an overview of the current status of this research field, and extended versions of the best papers of the Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) LIVE cybersecurity conference (https://2021.jnic.es) are also invited to publish in this Special Issue. This Special Issue covers a variety of topics including, but not limited to, new standards, frameworks, methods, algorithms, solutions, and applications in the following areas:

  • Prevention, detection, and response;
  • Attack and Cybercrime Detection;
  • Security Event Monitoring;
  • Attacks and Vulnerabilities;
  • Forensic Analysis;
  • Cryptology, Cryptocurrencies, and Blockchain;
  • Mobile Device Security;
  • Cloud Computing Security;
  • IoT Security;
  • Industrial and Critical Infrastructure Security;
  • Dataset and Big Data Security;
  • Privacy and Access Control;
  • Information Systems and Software Security;
  • Risk Assessment and Security Management;
  • 5G Network Security;
  • Training and Educational Innovation

Dr. Cristina Alcaraz
Dr. Noemí de Castro García
Dr. Manuel A. Serrano
Dr. David G. Rosado
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • cyber defense
  • security in IoT
  • cloud computing
  • big data
  • mobile device
  • attacks
  • vulnerabilities
  • prevention
  • detection
  • response
  • risk assessment security management
  • industrial environments critical infrastructure security
  • cryptology
  • cryptocurrencies
  • blockchain

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 2590 KiB  
Article
An Empirical Study of Mobile Commerce and Customers Security Perception in Saudi Arabia
by Hina Gull, Saqib Saeed, Sardar Zafar Iqbal, Yasser A. Bamarouf, Mohammed A. Alqahtani, Dina A. Alabbad, Madeeha Saqib, Saeed Hussein Al Qahtani and Albandary Alamer
Electronics 2022, 11(3), 293; https://doi.org/10.3390/electronics11030293 - 18 Jan 2022
Cited by 25 | Viewed by 5963
Abstract
Digital transformation of businesses has seen tremendous growth recently, moreover, COVID-19 has increased online shopping. However, it is important for businesses that customers’ online shopping experience is secure and joyful. In this paper, customers’ security perception regarding some leading mobile commerce applications in [...] Read more.
Digital transformation of businesses has seen tremendous growth recently, moreover, COVID-19 has increased online shopping. However, it is important for businesses that customers’ online shopping experience is secure and joyful. In this paper, customers’ security perception regarding some leading mobile commerce applications in Saudi Arabia is explored. Our survey questions focused on three aspects, namely: Consumer rating, trustworthiness, and credit card security. The results highlight that consumers perceive that mobile commerce applications in Saudi Arabia need further improvement in security. In this work, a model to improve customers’ security perception in Saudi Arabia is presented. This model can be generalized to other geographical regions as well. The model outlines different actions for practitioners and policymakers that help in improving security infrastructure, authentication mechanisms, and trustworthiness. Full article
(This article belongs to the Special Issue Cybersecurity in Information Systems and Technology)
Show Figures

Figure 1

19 pages, 875 KiB  
Article
Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme
by Marino Tejedor-Romero, David Orden, Ivan Marsa-Maestre, Javier Junquera-Sanchez and Jose Manuel Gimenez-Guzman
Electronics 2021, 10(24), 3075; https://doi.org/10.3390/electronics10243075 - 9 Dec 2021
Cited by 8 | Viewed by 4039
Abstract
A number of e-voting systems have been proposed in the last decades, attracting the interest of the research community. The challenge is far from being fully addressed, especially for remote systems. In this work, we propose DiverSEC, a distributed, remote e-voting system based [...] Read more.
A number of e-voting systems have been proposed in the last decades, attracting the interest of the research community. The challenge is far from being fully addressed, especially for remote systems. In this work, we propose DiverSEC, a distributed, remote e-voting system based on Shamir secret sharing, operations in Galois field and mixnets, which enables end-to-end vote verification. Parties participate as nodes in the network, protecting their interests and ensuring process integrity due to the conflicting interests. The threat model is very conservative, not letting even the most privileged actors to compromise votes privacy or integrity. Security in depth is implemented, overlapping different mechanisms to offer guarantees even in the most adverse operating conditions. The main contributions of the resulting system are our proposal for secret-sharing among the political parties, which guarantees that no party can compromise the integrity of the ballot without being detected and identified in real time, and the computational and architectural scalability of the proposal, which make it easy to implement. Full article
(This article belongs to the Special Issue Cybersecurity in Information Systems and Technology)
Show Figures

Figure 1

Back to TopTop