• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Cg
  • Home
  • / ...
  • /Magazines
  • /Cg

CLOSED Call for Papers: Cybersecurity Policy

Call for Papers for IEEE Security & Privacy

Articles due to ScholarOne: CLOSED Publication date: January/February 2020 During the next five years, significant new trends will emerge that change the landscape of policymaking as it relates to cybersecurity. Whatever the driver of these changes—new technologies, threat types, or innovative approaches in government, industry, or society—there is a need to anticipate and prepare for them. This special issue will focus on the future trends impacting cybersecurity policy, with a focus on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. Topics include, but are not limited to:
  • How new technologies will affect cyber policy issues, for example, the impact of quantum computing on the encryption debate.
  • The case for increased emphasis or attention on under-served areas of cybersecurity policy, for example, data security for human genetic information.
  • Case studies or proposals for innovative ways to advance public-private partnerships for cybersecurity.
  • How artificial intelligence-driven cyber tools, both offensive and defensive, will change the landscape for cyber conflict.
  • The next evolution of digital disinformation threats and how societies can prepare.
  • Implications of emerging cyber threats to critical infrastructure, such as the risks posed to census databases or space assets.
  • New approaches to establishing international norms of responsible behavior in cyberspace or reducing the risk of cyber conflict between major nation states.
  • Proposed parameters or objectives for a “cyber moonshot” – a unifying national or international goal to improve cybersecurity in fundamental ways.
  • Trends that will aid or exacerbate prospects for managing vulnerabilities in software and hardware, for example,  artificial intelligence for safer coding.
  • How data sharing will evolve and implications of new laws on sharing, privacy, law enforcement, legislation, commerce, and partnerships.
Submission Guidelines All submissions must comply with rules on what we publish. Submissions will be subject to the peer-review methodology for refereed papers. Articles should run between 4,900 to 7,200 words, with a maximum of 15 references. Articles should be understandable to a broad audience of people interested in security and privacy. The writing should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be edited according to the IEEE Computer Society style guide. As this is not a research journal, please do not submit research papers. Submit manuscripts here, or email the guest editors at sp-01-2020@computer.org for more information. Questions? Direct any questions and submit abstracts to BOTH guest editors:
  • Kate Charlet, Program Director for Technology and International Affairs, Carnegie Endowment for International Peace (katherine.charlet@ceip.org)
  • Heather King, Chief Operating Officer, Cyber Threat Alliance (heatherking@CYBERTHREATALLIANCE.ORG)
LATEST NEWS
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Computing’s Top 30: Tejas Padliya
Computing’s Top 30: Tejas Padliya
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development
Read Next

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development

IEEE Std 3158.1-2025 — Verifying Trust in Data Sharing: Standard for Testing and Performance of a Trusted Data Matrix System

IEEE Std 3220.01-2025: Standard for Consensus Framework for Blockchain System

Mapping the $85B AI Processor Landscape: Global Startup Surge, Market Consolidation Coming?

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter