ISSN: 1361-3723
Journal Home
Journal Guideline
Computer Fraud and Security Q2 Unclaimed
Computer Fraud and Security is a journal indexed in SJR in Law and Computer Science (miscellaneous) with an H index of 32. It has an SJR impact factor of 0,361 and it has a best quartile of Q2. It is published in English. It has an SJR impact factor of 0,361.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -

- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,361
SJR Impact factor32
H Index0
Total Docs (Last Year)91
Total Docs (3 years)0
Total Refs131
Total Cites (3 years)91
Citable Docs (3 years)0.96
Cites/Doc (2 years)0.0
Ref/DocOther journals with similar parameters
Spatial Statistics Q2
Air Quality, Atmosphere & Health Q2
Journal of Environmental Quality Q2
Ecological Management and Restoration Q2
Development Policy Review Q2
Compare this journals
Aims and Scope
Best articles by citations
Return of key escrow in Washington - Rejection in Paris
View moreAGMA Industry Initiative To Warn Consumers
View moreInfamous hacker soon to be free
View moreCyberlaw Roundup
View moreAuditing - The Future of IT Security
View moreThe security implications of the digital diary
View moreLessons from America
View moreDef Con V computer hacker's heaven, corporate job fair
View moreHigh-end IT Security: No Longer a Distant Pipe Dream for SMEs
View moreDefamation on the net
View moreComputer security controls - Diffusion into the smaller firm
View moreCrypto and infowar squabbles
View moreInformation warfare: the sequel
View morePolice phone lines focus for hackers
View moreThreat assessment: steps to successful creation of a corporate threat management plan
View moreInformation Security Assessment: Procedures and Methodology
View morePrivacy Safeguards To Be Rolled Back In Wake Of Attack
View moreChanging policies towards encryption and internet security
View moreThe Lighter Side of Information Security
View moreCorporate fraud
View moreDisaster recovery ignored
View moreIntegrity and the quality of information: Part 1
View moreHacking: Myth or menace, Part I
View moreProject spotlight US security initiative launched
View more
Comments