You are here: Home Contents V10 N2 V10N2_Beebe.html
Personal tools

Ranking Publication Outlets for Information Security Research

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 10, Number 2 (2014)
Pages 3757
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Nicole Beebe — The University of Texas at San Antonio, USA
Jan Clark — The University of Texas at San Antonio, USA
Priya Padmanabhan — The University of Texas at San Antonio, USA
Frederick Chang — The Southern Methodist University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

This research developed ranked lists of scholarly publication outlets forinformation security research, which is important for readers, authors, and institutions. We followed a two-step survey process: carrying out a free-recall survey to identify the “basket” of publication outlets for ranking,followed by a second survey to rank the outlets that were identified in the basket. The final ranking lists are supported by an average of n=111respondents per venue, with some venues being evaluated by as many as n=267 respondents. The ranked lists accomplish the following: 1) reflect thecomputer science and information system perspectives both together and independently; 2) accommodate sub-discipline diversity within the field; 3) include conference and journal venues; and, 4) evaluate traditional and pure information security venues. Our findings suggest that several currently unranked information security publication outlets (so called “C-list” outlets)may be considered high-quality (“A-list”). We also found that the perceivedquality of many pure information security venues exceeds traditional venues,and that the perceived quality of many information security conferences exceeds journal venues.

 

 

Keywords

Publication rank, Information Security, Ranked Lists, Publication Venues, Free-recall Survey, Information Security Conferences.

 

 

References

Adams D and Johnson N (2008) The Journal List and Its Use: Motivation, Perceptions, and Reality. European Journal of Information Systems 17(2), 158-162.

Althouse BM, et al. (2009) Differences in Impact Factor across Fields & over Time. Journal of the American Society for Information Science and Technology 60(1), 27-34.

Baskerville R (2008) For Better or Worse: How We Apply Journal Ranking Lists. European Journal of Information Systems 17(2), 156-157.

Bhowmick SS Computer Science Journal Rankings.

Christofferson LR and Lunt BM (2009) Ranking Scholarly Outlets for Information Technology. In Proceedings of the 10th ACM conference on SIG-information technology education, pp 115-126, ACM.

CORE (2010) Journal Rankings.

Freyne J, et al. (2010) Relative Status of Journal and Conference Publications in Computer Science. Communications of the ACM 53(11), 124-132.

Gianvecchio S Core Computer Science Conference Rankings 2007. http://www.gianvecchio.com/tier-conf-final2007.html

Gu G Computer Security Conference Ranking and Statistics. http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm

Hardgrave BC and Walstrom KA (1997) Forums for Mis Scholars. Communications of the ACM 40(11), 119-124.

Katerattanakul P & Han B (2003) Are European IS Journals under-Rated? An Answer based on Citation Analysis. European Journal of Information Systems 12(1) 60-71.

Katerattanakul P, et al. (2003) Objective Quality Ranking of Computing Journals. Communications of the ACM 46(10), 111-114.

Lim A, et al. (2009) Distinguishing Citation Quality for Journal Impact Assessment. Communications of the ACM 52(9), 111-116.

Lowry P, et al. (2004) Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals. Journal of the Association for Information Systems (JAIS) 5(2), 29-80.

Mylonopoulos NA and Theoharakis V (2001) On Site: Global Perceptions of Is Journals. Communications of the ACM 44(9), 29-33.

Peffers K and Ya T (2003) Identifying and Evaluating the Universe of Outlets for Information Systems Research: Ranking the Journals. Journal of Information Technology Theory and Application 5(1), 63-84.

Polites GL and Watson RT (2008) The Centrality and Prestige of Cacm. Communications of the ACM 51(1), 95-100.

Rahm E (2008) Comparing the Scientific Impact of Conference and Journal Publications in Computer Science. Information Services and Use 28(2), 127-128.

Rainer Jr RK and Miller MD (2005) Examining Differences across Journal Rankings. Communications of the ACM 48(2), 91-94.

Satyanarayana A Computer Science Conference Rankings.

Walstrom KA, et al. (1995) Forums for Management Information Systems Scholars. Communications of the ACM 38(3), 93-107.

Whitman ME, et al. (1999) Research Commentary. Academic Rewards for Teaching, Research and Service: Data & Discourse. Information Systems Research 10(2), 99-109.

Wikipedia List of Computer Science Conferences: Security and Privacy.

Willcocks L, et al. (2008) The Ranking of Top Is Journals: A Perspective from the London School of Economics. European Journal of Information Systems 17(2), 163-168.

Zafar H and Clark JG (2009) Current State of Information Security Research in Is. Communications of the Association for Information Systems 24(1), 557-596.

Zaiane OR (2011) Computer Science Conference Rankings.