• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Cg
  • Home
  • / ...
  • /Magazines
  • /Cg

CLOSED Call for Papers: Cybersecurity Policy

Call for Papers for IEEE Security & Privacy

Articles due to ScholarOne: CLOSED

Publication date: January/February 2020

During the next five years, significant new trends will emerge that change the landscape of policymaking as it relates to cybersecurity. Whatever the driver of these changes—new technologies, threat types, or innovative approaches in government, industry, or society—there is a need to anticipate and prepare for them. This special issue will focus on the future trends impacting cybersecurity policy, with a focus on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner.

Topics include, but are not limited to:

  • How new technologies will affect cyber policy issues, for example, the impact of quantum computing on the encryption debate.
  • The case for increased emphasis or attention on under-served areas of cybersecurity policy, for example, data security for human genetic information.
  • Case studies or proposals for innovative ways to advance public-private partnerships for cybersecurity.
  • How artificial intelligence-driven cyber tools, both offensive and defensive, will change the landscape for cyber conflict.
  • The next evolution of digital disinformation threats and how societies can prepare.
  • Implications of emerging cyber threats to critical infrastructure, such as the risks posed to census databases or space assets.
  • New approaches to establishing international norms of responsible behavior in cyberspace or reducing the risk of cyber conflict between major nation states.
  • Proposed parameters or objectives for a “cyber moonshot” – a unifying national or international goal to improve cybersecurity in fundamental ways.
  • Trends that will aid or exacerbate prospects for managing vulnerabilities in software and hardware, for example,  artificial intelligence for safer coding.
  • How data sharing will evolve and implications of new laws on sharing, privacy, law enforcement, legislation, commerce, and partnerships.

Submission Guidelines

All submissions must comply with rules on what we publish.

Submissions will be subject to the peer-review methodology for refereed papers. Articles should run between 4,900 to 7,200 words, with a maximum of 15 references. Articles should be understandable to a broad audience of people interested in security and privacy. The writing should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be edited according to the IEEE Computer Society style guide. As this is not a research journal, please do not submit research papers.

Submit manuscripts here, or email the guest editors at sp-01-2020@computer.org for more information.

Questions?

Direct any questions and submit abstracts to BOTH guest editors:

  • Kate Charlet, Program Director for Technology and International Affairs, Carnegie Endowment for International Peace (katherine.charlet@ceip.org)
  • Heather King, Chief Operating Officer, Cyber Threat Alliance (heatherking@CYBERTHREATALLIANCE.ORG)
LATEST NEWS
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
From Legacy to Cloud-Native: Engineering for Reliability at Scale
From Legacy to Cloud-Native: Engineering for Reliability at Scale
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
IEEE Computer Society Announces 2026 Class of Fellows
IEEE Computer Society Announces 2026 Class of Fellows
Read Next

Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team

Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families

From Legacy to Cloud-Native: Engineering for Reliability at Scale

Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025

IEEE Computer Society Announces 2026 Class of Fellows

MicroLED Photonic Interconnects for AI Servers

Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award

Empowering Communities Through Digital Literacy: Impact Across Lebanon

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter