• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Cg
  • Home
  • / ...
  • /Magazines
  • /Cg

CLOSED Call for Papers: Cybersecurity Policy

Call for Papers for IEEE Security & Privacy

Articles due to ScholarOne: CLOSED

Publication date: January/February 2020

During the next five years, significant new trends will emerge that change the landscape of policymaking as it relates to cybersecurity. Whatever the driver of these changes—new technologies, threat types, or innovative approaches in government, industry, or society—there is a need to anticipate and prepare for them. This special issue will focus on the future trends impacting cybersecurity policy, with a focus on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner.

Topics include, but are not limited to:

  • How new technologies will affect cyber policy issues, for example, the impact of quantum computing on the encryption debate.
  • The case for increased emphasis or attention on under-served areas of cybersecurity policy, for example, data security for human genetic information.
  • Case studies or proposals for innovative ways to advance public-private partnerships for cybersecurity.
  • How artificial intelligence-driven cyber tools, both offensive and defensive, will change the landscape for cyber conflict.
  • The next evolution of digital disinformation threats and how societies can prepare.
  • Implications of emerging cyber threats to critical infrastructure, such as the risks posed to census databases or space assets.
  • New approaches to establishing international norms of responsible behavior in cyberspace or reducing the risk of cyber conflict between major nation states.
  • Proposed parameters or objectives for a “cyber moonshot” – a unifying national or international goal to improve cybersecurity in fundamental ways.
  • Trends that will aid or exacerbate prospects for managing vulnerabilities in software and hardware, for example,  artificial intelligence for safer coding.
  • How data sharing will evolve and implications of new laws on sharing, privacy, law enforcement, legislation, commerce, and partnerships.

Submission Guidelines

All submissions must comply with rules on what we publish.

Submissions will be subject to the peer-review methodology for refereed papers. Articles should run between 4,900 to 7,200 words, with a maximum of 15 references. Articles should be understandable to a broad audience of people interested in security and privacy. The writing should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be edited according to the IEEE Computer Society style guide. As this is not a research journal, please do not submit research papers.

Submit manuscripts here, or email the guest editors at sp-01-2020@computer.org for more information.

Questions?

Direct any questions and submit abstracts to BOTH guest editors:

  • Kate Charlet, Program Director for Technology and International Affairs, Carnegie Endowment for International Peace (katherine.charlet@ceip.org)
  • Heather King, Chief Operating Officer, Cyber Threat Alliance (heatherking@CYBERTHREATALLIANCE.ORG)
LATEST NEWS
CV Template
CV Template
A History of Rendering the Future with Computer Graphics & Applications
A History of Rendering the Future with Computer Graphics & Applications
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
Resume Template
Resume Template
IEEE Reveals 2026 Predictions for Top Technology Trends 
IEEE Reveals 2026 Predictions for Top Technology Trends 
Read Next

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

IEEE Reveals 2026 Predictions for Top Technology Trends 

7 Best Practices for Secure Software Engineering in 2026

Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech

Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter