<html><head><style type='text/css'>p { margin: 0; }</style></head><body><div style='font-family: Times New Roman; font-size: 12pt; color: #000000'><p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Colleagues:</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">As
 a fellow professor with a research interest in information security,
I’m sure you are as concerned as we are about identifying and defining
quality
 venues for the publication of papers, articles and research pieces on
information security, computer security, digital forensics and software
assurance topics.  While mainstream information systems and computer
science venues do publish in this area, there
 are several quality journals and magazines dedicated specifically to
the field of information security. 
</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">As
 information security emerges as its own discipline, it becomes critical
 to identify the best venues and recommend those to fellow faculty
members looking
 for such outlets and recognition for merit, tenure and promotion.  This
 information could be combined with established ratings and rankings of
IS and CS journals to complete a faculty member’s portfolio and vitae.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">While a number of research papers have identified and evaluated IS and CS venues (such as AIS’s MIS Journal Rankings at
<span class="object"><span class="Object" id="OBJ_PREFIX_DWT3720_com_zimbra_url"><a href="http://ais.affiniscape.com/displaycommon.cfm?an=1&subarticlenbr=432" target="_blank">http://ais.affiniscape.com/displaycommon.cfm?an=1&subarticlenbr=432</a></span></span>
which includes a study Dr. Whitman did previously on IS journals,
 which was published in Information Systems Research), we have yet to
identify a similar study focused EXCLUSIVELY on information security
journals.  As such, we have devised a survey of journals and magazines
that accept papers from academic authors, and need
 your assistance in completing it.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Our survey is located at  
</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span class="object"><b><span style="color:black"><span class="Object" id="OBJ_PREFIX_DWT3721_com_zimbra_url"><a href="http://coles.qualtrics.com/SE/?SID=SV_cAe0CBWCzoX8INC" target="_blank" id="link">http://coles.qualtrics.com/SE/?SID=SV_cAe0CBWCzoX8INC</a></span></span></b></span><span style="color:black"></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">We've also created a Tiny URL version for ease of use:</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span class="object"><b><span style="color:black"><span class="Object" id="OBJ_PREFIX_DWT3722_com_zimbra_url"><a href="http://tinyurl.com/infosecjournals" target="_blank">http://tinyurl.com/infosecjournals</a></span></span></b></span><span style="color:black"></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Please
 share this email with any of your colleagues that are actively
researching and publishing in information security.  If you wish to take
 this survey,
 but want to know what journals we are evaluating, you may download our
journal listing and URL document from
<br>
<span class="object"><span class="Object" id="OBJ_PREFIX_DWT3723_com_zimbra_url"><a href="http://infosec.kennesaw.edu/InfoSecJournals.pdf" target="_blank"><br>
</a></span><span class="Object" id="OBJ_PREFIX_DWT3724_com_zimbra_url"><a href="http://infosec.kennesaw.edu/InfoSecJournals.pdf" target="_blank">http://infosec.kennesaw.edu/InfoSecJournals.pdf</a></span></span>
</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">beforehand to facilitate survey completion.  It should only take a few minutes of your time, and the results will help us all.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Note: If you have previously completed this survey, there is no need to do so again.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Thank you in advance for your assistance.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black"> </span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Mike Whitman</span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto"><span style="color:black">Humayun Zafar</span></p>
<span style="color:black">Herb Mattord<br>
</span><br><br>-- <br><div><span></span>Michael E. Whitman, Ph.D., CISM, CISSP<br>Professor of Information Security;<br>Director, KSU Center for Information Security Education; &<br>Coordinator, BBA- and BS-Information Security & Assurance<br>Department of Information Systems <br>Michael J. Coles College of Business<br>Kennesaw State University - A National Center of Academic Excellence in Information Assurance Education<br>1000 Chastain Rd. MS 1101<br>Kennesaw, GA 30144-5591<br>Ph:  770.499.3568<br>Fx:  770.423.6731<br>Clendenin Building (12) Rm #3061<br>This message (including any attachments) contains confidential information intended for a specific individual and purpose, and is protected by law.   If you are not the intended recipient, you should delete this message immediately and are hereby notified that any disclosure, copying or distribution of this message, or the taking of any action based on it, is strictly prohibited.<br>Further, the contents of this email and any attachments it may be associated with may be protected by the copyright laws of the United States.<br><span></span><br></div></div></body></html>