About the Journal

Cyber security specialists use information technology (IT) skills such as programming, networking, and operating systems to secure systems and protect data. Everyone within an organization must practice safe computer usage to maintain proper security. Computer forensics is a reactive approach that seeks to recover data from a device to reveal evidence of criminal activity. Although it does not prevent cybercrime, the information uncovered can help inform cyber security professionals about how to prevent future crimes. Computer forensics professionals work with investigators to access a device's data or with companies to recover lost data. Cyber security is focused on prevention, while computer forensics is about recovery and reaction. Both aim to protect digital assets by preventing cybercrimes or identifying the culprit behind a crime. 

The Cyfors particularly focuses on the main problems in the development of Information Technology and Computer Science. It covers the Artificial Intelligence, Data Sciences, Computer Vision and Pattern Recognition, Computational Theory, Blockchain, Cybersecurity, Forensic etc.

Please read these guidelines carefully. Authors who want to submit their manuscript to the editorial office of Journal Cyfors should by the writing guidelines. If the manuscript submitted is not appropriate with the guidelines or written in a different format, it will BE REJECTED by the editors before further reviewed. The editors will only accept the manuscripts which meet the assigned format.

 

Current Issue

Vol. 3 No. 1 (2026): Sustainable Resilience: Safeguarding Digital Sovereignty and Human-Centric Security Systems
					View Vol. 3 No. 1 (2026): Sustainable Resilience: Safeguarding Digital Sovereignty and Human-Centric Security Systems

The third volume, titled "Sustainable Resilience: Safeguarding Digital Sovereignty and Human-Centric Security Systems," addresses the critical intersection of long-term system endurance, data autonomy, and the human element in the cybersecurity landscape. As digital ecosystems become increasingly fragmented and subject to complex geopolitical influences, this edition shifts the focus toward establishing "Sustainable Resilience"—a framework where security measures are not only robust against immediate attacks but are also adaptable and ethically aligned with societal needs. The volume explores the vital concept of digital sovereignty, examining how organizations and nations can maintain control over their data and infrastructure in an era of globalized cloud services and decentralized networks.

Furthermore, this volume emphasizes a "Human-Centric" approach, recognizing that technology alone cannot secure a digital frontier. It delves into the psychology of cybersecurity, user-centric forensic methodologies, and the development of intuitive security systems that empower rather than hinder the human user. By bridging the gap between high-level policy, behavioral science, and technical defense, Volume 3 provides a comprehensive roadmap for building a trustworthy digital future that prioritizes both sovereign integrity and the resilience of the human-machine partnership.

Published: 31-01-2026

Call For Paper

View All Issues