Editorial

Authors

  • Ivan Izonin Department of Artificial Intelligence, Lviv Polytechnic National University, Lviv, Ukraine
  • Tetiana Hovorushchenko Department of Computer Engineering & Information Systems, Khmelnytskyi National University, Khmelnytskyi, Ukraine
  • Peter Popov School of Science & Technology, Department of Computer Science, City University of London, London, United Kingdom

Keywords:

Editorial

Abstract

Currently, all areas of human activity are related to information systems, so the current problems in the use of information systems are currently reliable protection of information from cyber threats and malware and quality assurance of information systems. The amount of information is constantly growing, so the issue of information security is becoming more acute. The need for quality and safety is based on the fact that errors and failures in the information systems, the impact of malware threaten disasters that lead to human casualties, environmental cataclysms, significant time losses and financial damage, or at least reputational damage to the company. Known methods and tools in the field of cybersecurity and quality assurance are unable to provide reliable protection of information from malware, detection and disposal of malware, as well as unable to ensure the required level of quality of information systems. Therefore, special attention in the direction of development and implementation of effective information systems is currently needed in the field of quality and security of information systems.

Achieving high quality information systems, as well as their cybersecurity is a key factor in their effective use and one of the main needs of customers. This Special Issue aims to disseminate and discuss the quality and security of information systems. There are 8 original science-intensive studies in
our Special Issue on the following topics:
• Information Systems’ Quality
• Information Systems’ Security
• Information Systems’ Reliability
• Cybersecurity in Information Systems’ Domain
Some of it was accepted after a careful review and published in the proposed special issue.

Downloads

Download data is not yet available.

Author Biographies

Ivan Izonin, Department of Artificial Intelligence, Lviv Polytechnic National University, Lviv, Ukraine

Ivan Izonin is an Associate Professor at the Department of Artificial Intelligence of Lviv Polytechnic National University, Ukraine. He received his MSc degree in Computer science in 2011 and his MSc degree in Economic cybernetics in 2012. He received a Ph.D. in Artificial Intelligence in 2016. His main research interests are focused on computational intelligence, highspeed neural-like systems, non-iterative machine learning algorithms, and ensemble learning.

Tetiana Hovorushchenko, Department of Computer Engineering & Information Systems, Khmelnytskyi National University, Khmelnytskyi, Ukraine

Tetiana Hovorushchenko is the Head of Computer Engineering and Information Systems Department of Khmelnytskyi National University, Ukraine. She received her MSc degree in Computer engineering in 2002. She received a Ph.D. in Information Technologies in 2007 and a Dr.Sc. in Information Technologies in 2018. Her main research interests are focused on medical decision support systems, software quality evaluation and assurance.

Peter Popov, School of Science & Technology, Department of Computer Science, City University of London, London, United Kingdom

Peter Popov is an Associate Dean (International) at the School of Science & Technology, Department of Computer Science of City University of London, United Kingdom. He received his MSc degree in Computer engineering in 1982. He received a Ph.D. in Information Technologies in 1989. His main research interests are focused on software dependability

References

Hilgurt, S., Davydenko, A., Matovka, T., Prygara, M.: Tools for Analyzing Signature-based Hardware Solutions for Cyber Security Systems.

Journal of Cyber Security and Mobility. 1–21 (2023).

Hovorushchenko, T., Pavlova, O., Kostiuk, M.: Method of Increasing the Security of Smart Parking System. Journal of Cyber Security and

Mobility. 1–15 (2023).

Shepita, P., Tupychak, L., Shepita, J.: Analysis of Cyber Security Threats of the Printing Enterprise. Journal of Cyber Security and

Mobility. 1–16 (2023).

Sikora, L., Lysa, N., Tsikalo, Ye., Fedevych, O.: System-information and cognitive technologies of man-made infrastructure cyber security.

Journal of Cyber Security and Mobility. 1–21 (2023).

Pravorska, N.: Additional Detection of Clones Using Locally Sensitive Hashing. Journal of Cyber Security and Mobility. 1–21 (2023).

Hovorushchenko, T., Hnatchuk, Ye., Osyadlyi, V., Kapustian, M., Boyarchuk, A.: Blockchain-Based Medical Decision Support System.

Journal of Cyber Security and Mobility. 1–18 (2023).

Gorev, V., Gusev, A., Korniienko, V., Shedlovska, Ya.: On the Use of the Kolmogorov–Wiener Filter for Heavy-Tail Process Prediction. Journal

of Cyber Security and Mobility. 1–19 (2023).

Salman, F.M., Taha, M. A.: Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime. Journal of Cyber

Security and Mobility. 1–15 (2023).

Downloads

Published

2023-05-18

How to Cite

1.
Izonin I, Hovorushchenko T, Popov P. Editorial. JCSANDM [Internet]. 2023 May 18 [cited 2024 Nov. 22];12(03):v-x. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22717

Issue

Section

Assurance of Information Systems’ Quality and Security

Most read articles by the same author(s)