Call for Chapters: Navigating Cyber Threats and Cybersecurity in the Software Industry

Editors

Imdad Ali Shah, School of Computing Science SC, Taylor's University, Malaysia, Malaysia
Noor Jhanjhi, School of Computer Science and Engineering SCE, Taylor’s University, Malaysia

Call for Chapters

Proposals Submission Deadline: May 5, 2024
Full Chapters Due: July 28, 2024
Submission Date: July 28, 2024

Introduction

The expression computational intelligence usually refers to the ability of a computer to learn a specific task from data or experimental observation. A cybersecurity framework is a set of best practices a company should use to manage its cybersecurity risk. The framework's goal is to identify the parts of an organisation most vulnerable to data breaches and other compromising behaviour and then establish policies, procedures, and other controls to decrease those risks to acceptable levels. An effective cyber risk management framework is tightly integrated with the organization's risk management strategy and programmes. More devices are coming online, and indiscriminate cybersecurity threats are increasing. Any entity operating in the digital domain is vulnerable. The primary objective of this book is to focus on the important aspects of data management in condition monitoring and maintenance, especially when emerging technologies and measures advance computational intelligence in navigating threats and Cybersecurity frameworks. Cyber threats and attacks are increasingly common in all industries.

Objective

Comprehensive Overview: Provide a comprehensive overview of the evolving landscape of cyber threats and cybersecurity challenges facing the software industry, encompassing a wide range of threats, vulnerabilities, and attack vectors. Analysis of Current Trends: Analyze current trends and emerging threats in the software industry, including malware, ransomware, phishing attacks, supply chain vulnerabilities, and data breaches, to help readers understand the evolving nature of cyber risks. Best Practices and Countermeasures: Offer practical guidance and best practices for mitigating cyber threats and enhancing cybersecurity posture within software development processes, including secure coding practices, vulnerability management, threat intelligence, and incident response strategies. Case Studies and Real-World Examples: Present case studies and real-world examples illustrating cybersecurity incidents and breaches within the software industry, highlighting key lessons learned, challenges faced, and successful mitigation strategies employed by organizations. Strategic Planning and Risk Management: Guide readers in developing strategic cybersecurity plans and risk management strategies tailored to the unique challenges and requirements of the software industry, addressing regulatory compliance, business continuity, and resilience against cyber threats.

Target Audience

1. Software Developers and Engineers: Professionals involved in software development, coding, and programming who need to understand cybersecurity principles, best practices, and secure coding techniques to develop resilient and secure software applications. 2. Cybersecurity Practitioners: Cybersecurity professionals, including security analysts, engineers, architects, and consultants, who specialize in securing software systems, networks, and applications within the software industry. 3. IT Managers and Decision-Makers: IT managers, CIOs, CTOs, and other decision-makers responsible for overseeing cybersecurity initiatives, risk management strategies, and technology investments within software development organizations. 4. Software Quality Assurance (QA) Professionals: QA engineers, testers, and quality assurance professionals tasked with ensuring the security, reliability, and quality of software products through testing, validation, and compliance with cybersecurity standards and regulations. 5. Academic Researchers and Educators: Researchers, scholars, and educators in the fields of computer science, cybersecurity, software engineering, and information technology seeking in-depth knowledge and resources for teaching, research, and academic study related to cyber threats and cybersecurity in the software industry. 6. Government Agencies and Regulators: Government agencies, regulatory bodies, and policymakers responsible for developing and enforcing cybersecurity regulations, standards, and guidelines applicable to the software industry, as well as assessing compliance and promoting cybersecurity awareness and resilience. 7. Business Executives and Stakeholders: Business executives, stakeholders, and board members of software companies, startups, and technology firms interested in understanding the business implications of cyber threats, cybersecurity risks, and the importance of investing in cybersecurity measures to protect their organizations' assets, reputation, and bottom line.

Recommended Topics

1. Introduction to Cyber Threats in the Software Industry 2. Understanding Software Vulnerabilities and Exploits 3. Principles of Secure Software Development 4. Secure Coding Practices and Guidelines 5. Threat Modeling for Software Systems 6. Software Security Testing Techniques and Tools 7. Managing Software Supply Chain Risks 8. Securing Cloud-Based Software Applications 9. Mobile Application Security Best Practices 10. Data Protection and Privacy in Software Development 11. Incident Response and Cyber Crisis Management 12. Regulatory Compliance and Legal Considerations 13. DevSecOps: Integrating Security into DevOps Pipelines 14. Building a Cybersecurity Culture in Software Organizations 15. Future Trends and Emerging Challenges in Software Security 16. Computational Intelligence 17. Digital Business 18. Security Issues and Challenges Software Industry 19. Cybersecurity Frameworks 20. Software Development Methodology 21. Threat Modelling 22. Application Security Testing 23. Open-source distributed applications 24. Web-based decision support systems 25. Biometrics 26. Cloud-Based Software Systems 27. Rising Software Vulnerabilities

Submission Procedure

Researchers and practitioners are invited to submit on or before May 5, 2024, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by May 19, 2024 about the status of their proposals and sent chapter guidelines.Full chapters are expected to be submitted by July 28, 2024, and all interested authors must consult the guidelines for manuscript submissions at https://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Navigating Cyber Threats and Cybersecurity in the Software Industry. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery® online submission manager.



Publisher

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit https://www.igi-global.com. This publication is anticipated to be released in 2025.



Important Dates

May 5, 2024: Proposal Submission Deadline
May 19, 2024: Notification of Acceptance
July 28, 2024: Full Chapter Submission
September 8, 2024: Review Results Returned
October 6, 2024: Final Acceptance Notification
October 13, 2024: Final Chapter Submission



Inquiries

Imdad Ali Shah School of Computing Science SC, Taylor's University, Malaysia shahsyedimdadali@gmail.com Prof. Dr Noor Zaman Jhanjhi School of Computer Science SCS, Taylor’s University, Malaysia noorzaman.jhanjhi@taylors.edu.my

Classifications


Business and Management; Computer Science and Information Technology; Education; Security and Forensics; Science and Engineering
Back to Call for Papers List