ISSN: 1361-3723
Journal Home
Journal Guideline
Computer Fraud and Security Q3 Unclaimed
Computer Fraud and Security is a journal indexed in SJR in Law and Computer Science (miscellaneous) with an H index of 34. It has an SJR impact factor of 0,156 and it has a best quartile of Q3. It is published in English. It has an SJR impact factor of 0,156.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -

- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,156
SJR Impact factor34
H Index25
Total Docs (Last Year)149
Total Docs (3 years)157
Total Refs72
Total Cites (3 years)141
Citable Docs (3 years)0.23
Cites/Doc (2 years)6.28
Ref/DocOther journals with similar parameters
International Review of Environmental and Resource Economics Q3
Water S.A. Q3
Environmental Forensics Q3
Evergreen Q3
Polityka Energetyczna Q3
Compare this journals
Aims and Scope
Best articles by citations
Return of key escrow in Washington - Rejection in Paris
View moreAGMA Industry Initiative To Warn Consumers
View moreInfamous hacker soon to be free
View moreCyberlaw Roundup
View moreAuditing - The Future of IT Security
View moreThe security implications of the digital diary
View moreLessons from America
View moreDef Con V computer hacker's heaven, corporate job fair
View moreHigh-end IT Security: No Longer a Distant Pipe Dream for SMEs
View moreDefamation on the net
View moreComputer security controls - Diffusion into the smaller firm
View moreCrypto and infowar squabbles
View moreInformation warfare: the sequel
View morePolice phone lines focus for hackers
View moreThreat assessment: steps to successful creation of a corporate threat management plan
View moreInformation Security Assessment: Procedures and Methodology
View morePrivacy Safeguards To Be Rolled Back In Wake Of Attack
View moreChanging policies towards encryption and internet security
View moreThe Lighter Side of Information Security
View moreCorporate fraud
View moreDisaster recovery ignored
View moreIntegrity and the quality of information: Part 1
View moreHacking: Myth or menace, Part I
View moreProject spotlight US security initiative launched
View more
Comments