SPECIAL ISSUE PROPOSAL

Towards Trustworthy Mobile Information Management: Cross-Disciplinary Perspectives on Security and Privacy Challenges

 

In the age of big data, mobile information management faces significant security and privacy challenges. With the increasing number of mobile devices and the volume of data they generate, there is a growing need for effective security measures to protect users' personal information and sensitive data. Some key security and privacy challenges in mobile information management include Data Breaches: Mobile devices are vulnerable to data breaches, which can result in the loss or theft of sensitive information, such as financial data, personal identification information (PII), and medical records. Cybercriminals use various techniques to access users' devices and data, including malware and phishing attacks. Third-Party Apps:

 

Many users rely on third-party apps to enhance the functionality of their mobile devices. However, these apps can pose significant security risks, as they may collect and transmit users' data to third-party servers without their consent or knowledge. Sometimes, these apps may contain malware that can compromise users' devices and data. Cloud Storage: Many mobile devices are linked to cloud storage services, which can provide convenient access to data from multiple devices. However, this also increases the risk of data breaches and unauthorized access to sensitive data. Lack of Encryption: Encryption is a critical security feature that helps protect users' data from unauthorized access. However, many mobile devices lack proper encryption, leaving users' data vulnerable to attack. Device Theft or Loss: The loss or theft of a mobile device can result in the loss of sensitive data. Thieves can easily access users' data without proper security measures and use it for malicious purposes.

 

To address these challenges, users and organizations must implement effective security measures, such as strong passwords, two-factor authentication, data encryption, and mobile device management (MDM) software. Additionally, users should be cautious when downloading and using third-party apps and regularly back up their data to prevent the loss of important information.

 

The special issue aims to bring together researchers and practitioners to share their latest research findings and insights on the security and privacy challenges in mobile information management in the age of big data. The objective is to provide a platform for discussions and exchanging ideas on the latest developments, emerging trends, and best practices in mobile information management.

 

 

Original research and review articles in this area are encouraged in the following topic areas, including but are not limited to:

 

¡÷    Open-source mobile security tools and their effectiveness in securing mobile devices

¡÷    Data security and privacy in mobile cloud computing

¡÷    Security and privacy challenges in mobile cloud computing systems

¡÷    Trust models for mobile information management

¡÷    Data breaches and cyber attacks on mobile devices

¡÷    Privacy concerns in mobile information management

¡÷    Third-party apps and their impact on mobile security and privacy

¡÷    Cloud storage and its security implications in mobile information management

¡÷    Encryption and its role in mobile data security

¡÷    Mobile device theft and loss prevention measures

¡÷    Mobile device management (MDM) strategies and their effectiveness in securing mobile devices

¡÷    Mobile security and privacy regulations and compliance

 

Our Guest Editor Team Members:

 

Dr. Shadi Mahmoud Faleh AlZu¡¦bi

Associate Professor at Department of Computer Science,

Faculty of Science and Information Technology,

Al-Zaytoonah University of Jordan, Amman, Jordan.

E-mail: smalzubi@zuj.edu.jo, dr.shadi.alzubi@gmail.com  

Google Scholar: https://scholar.google.com/citations?user=7QuybU4AAAAJ&hl=en

ResearchGate: https://www.researchgate.net/profile/Shadi-Alzubi

¡÷           Short Biography: Dr. Shadi Mahmoud Faleh AlZu¡¦bi received his Ph.D. (Electronic and Computer / Computer Science) in 2011 at Brunel University, West London, United Kingdom, M.Sc. (Telecommunication Networks Management) in 2008 from University of Technology, Sydney, Australia, and B.Sc. (Computer and Network Engineering) in 2007 from Jordan University of Science and Technology, Jordan. He is currently working as Associate Professor at Department of Computer Science, Faculty of Science and Information Technology, Al-Zaytoonah University of Jordan, Amman, Jordan.

¡÷           Research Interests: His current research interests include the extreme learning machine for several applications such as computer vision (image processing, medical imaging, 3D volume processing, computation acceleration using parallel processing and image compression and archiving), intelligent systems (smart agriculture, autonomous driving, smart cities, and NLP).

 

Dr. Maysam Abbod

Professor at Department of Electronic and Electrical Engineering

Brunel University London, Uxbridge, UB8 3PH, UK.

E-mail: maysam.abbod@brunel.ac.uk

Google Scholar: https://scholar.google.com/citations?user=aY6hO_8AAAAJ&hl=en

ResearchGate: https://www.researchgate.net/profile/Maysam-Abbod

¡÷           Short Biography: Dr. Maysam Abbod (MIET, CEng, SMIEEE, SFHEA) He received BSc degree in Electrical Engineering from University of Technology in 1987and PhD in Control Engineering from University of Sheffield in 1992. From 1993 to 2006 he was with the Department of Automatic Control and Systems Engineering at the University of Sheffield as a research associate and senior research fellow.

¡÷           Research Interests: His main research areas are Intelligent systems biomedical applications, Modelling and control of electrical power quality, Stock exchange market modelling, Intelligent systems for credit scoring, Intelligent hybrid modelling and control of distillation column systems, Time series modelling, Hybrid modelling techniques (multivariate/time series), Developments of advanced process modelling, optimisation and control strategies and Data mining and data driven modelling techniques.

 

Dr. Ashraf Darwish

Professor of Computer Science,

Faculty of Science,

Helwan University, Cairo, Egypt

E-mail: ashraf.darwish.eg@ieee.org

Google Scholar: https://scholar.google.com/citations?user=JJF6Q3cAAAAJ&hl=en

ResearchGate: https://www.researchgate.net/profile/Ashraf-Darwish-3

¡÷           Short Biography: Dr. Ashraf Darwish is an Associate Professor of Computer Science and Acting as the Head of Mathematics and Computer Science Department at Faculty of Science, Helwan University, Egypt. He received the PhD degree in computer science from Saint Petersburg State University, Russian Federation in 2006. He received B.Sc. and M.Sc. in Mathematics from Faculty of Science, Tanta University, Egypt. He keeps in touch with his mathematical background through his research.

¡÷           Research Interests: His research interests include information security, data and web mining, intelligent computing, image processing (in particular image retrieval, medical imaging), modeling and simulation, computational intelligence, sensor networks, theoretical foundations of computer science, cloud computing, and internet of things.

 

 

 

 

Important Dates

¡÷           Submission deadline:     May 30, 2024

¡÷           Author notification:       August 25, 2024

¡÷           Revised papers due:      October 30, 2024

¡÷           Final notification:          January 05, 2025

¡÷           Publication: As per the policy of journal