About the Journal
The ISSA Journal is the official publication of the Information Systems Security Association (ISSA). Established in 1993, the Journal serves as a trusted resource for cybersecurity professionals, researchers, practitioners, and leaders seeking rigorous, practitioner-focused insight into the rapidly evolving field of information security.
To submit an article or column, you must first register or log in. After logging in, go to About → Submissions and click Make New Submission to begin. To check the status of an existing submission, log in and select View Your Pending Submissions.
ISSA Journal Submission & Production Process
1. Publication Cadence
The ISSA Journal is a bi-monthly publication:
-
Jan/Feb
-
Mar/Apr
-
May/Jun
-
Jul/Aug
-
Sep/Oct
-
Nov/Dec
Target publication timing is the first week of the second month of each issue (e.g., Jan/Feb publishes in early February).
2. Content Categories
ISSA Journal accepts two primary types of content:
A. Journal Articles
Long-form, research-oriented, or deeply analytical pieces that:
-
Typically includes references/citations
-
Present original research, case studies, or substantial analysis
Target Length: 2,000–3,000 words (flexible where appropriate)
Peer Review: Formal peer review required
B. Columns
Short-form practitioner-focused pieces including:
-
Opinion or perspective pieces
-
How-to / practitioner guidance
-
Trend commentary
-
Case examples
-
SIG and Committee updates
Target Length: 600–1,000 words (SIG / Committee updates recommended max: 800 words)
Peer Review: None/Light editorial overview
3. Submission Method
All content (articles, columns, and updates) must be submitted through the ISSA Journal’s Open Journal Systems (OJS) platform (https://issajournal.org/). Submissions sent via email or other channels will be redirected to OJS.
OJS serves as the system of record for:
-
Submissions
-
Author information
-
Peer review
-
Editorial decisions
-
Revisions
-
Final acceptance
4. Deadlines by Issue
|
Issue |
Article Deadline |
Column / Other Deadline |
|
Jan/Feb |
Dec 1 |
Jan 10 |
|
Mar/Apr |
Feb 1 |
Mar 10 |
|
May/Jun |
Apr 1 |
May 10 |
|
Jul/Aug |
Jun 1 |
Jul 10 |
|
Sep/Oct |
Aug 1 |
Sep 10 |
|
Nov/Dec |
Oct 1 |
Nov 10 |
Deadlines are approximate and may adjust slightly based on production needs. Submissions within these timeframes do not guarantee placement in that issue.
5. Editorial Review & Quality Standards
All content is subject to editorial review for:
-
Clarity
-
Technical accuracy
-
Grammar, spelling, punctuation
-
Consistency with ISSA Journal style and tone
Editors may request revisions.
6. ISSA Journal Style Guide
The ISSA Journal publishes practitioner focused, vendor neutral, high quality content intended for a global information security audience. All submissions must adhere to the following style and content standards.
Editorial Principles
-
The ISSA Journal does not accept articles that promote a specific company, product, or commercial offering.
-
Submissions must be vendor-neutral and focus on technologies, methods, practices, trends, or lessons learned.
-
All submissions must be the original work of the author(s) and must not have appeared in other publications.
-
The ISSA Journal does not accept articles generated by artificial intelligence tools; AI-assisted editing or grammar checking is permitted, but authors must be the primary creators of all content and responsible for its accuracy and originality.
-
Where appropriate, manuscripts should be written for an international audience, avoiding region specific assumptions.
-
All accepted manuscripts are subject to editorial editing for: Adherence to journal format and style, Clarity and readability, and Grammar, syntax, punctuation, and consistency
-
Authors are encouraged to write clearly and concisely.
-
Authors are encouraged to supply relevant visual materials that clarify or enhance the manuscript. Authors must ensure they have rights to all submitted artwork.
References and Citations (APA Style)
The ISSA Journal follows APA (7th edition) citation and reference style.
-
Sources must be cited in-text using author date format.
Example: (Williams, 2008) -
A reference list must appear at the end of the manuscript.
-
Authors should cite foundational books, scholarly articles, industry publications, and publicly accessible web sources where applicable.
Example References
Book
Williams, B. R. (2008). Cyber forensics: A field manual for collecting, examining, and preserving evidence of computer crimes. Auerbach Publications. https://www.taylorandfrancisgroup.com
Journal Article
Marcella, A. J., & Menendez, D. (2008). Data flow made easy. ISSA Journal, March 2008. https://www.issa.org
Author Information
Each submission must include:
-
Author name(s)
-
Email address (to allow reader contact)
-
Short professional biography (2–3 sentences)
-
ISSA chapter affiliation (if applicable)
-
LinkedIn profile URL
Writing Mechanics and Usage
-
American English spelling and conventions
-
organization (not organisation)
-
authorization (not authorisation)
-
Minimal capitalization
-
information security is not a proper noun
-
Oxford comma
-
this, that, and the other
-
Quotation punctuation follows standard American usage
-
Commas and periods inside quotation marks
Grammar and Pronoun Usage
Pronoun agreement should be maintained:
-
Singular: a user and his or her
-
Plural: users and their systems
Gender neutral phrasing is encouraged where possible.
Ethics and Attribution
Authors must:
-
Properly attribute all sources
-
Avoid plagiarism and excessive self citation
-
Disclose potential conflicts of interest