ISACA Journal: 2017 Editorial Calendar

For Authors For Advertisers
Issue Date Theme Drafts Due* Articles Due** Insertion Due Art Due Mail Date


2017

Volume 1
Jan/Feb

Cognitive Technology
- Robotics
- Smart machines
- Artificial intelligence and machine learning
- Machine learning—security applications
- Risk analysis using cognitive technologies
- Cognitive computing threat models
- Auditing the cloud

9/21/2016

10/20/2016

11/21/16

11/30/16

1/3/2017

Volume 2
Mar/Apr

The Evolution of Audit
- Auditing social media
- Tools for audit
- Soft skills for auditors
- Audit transparency
- Future of audit

11/18/2016

12/22/2016

1/24/2017

1/31/2017

3/1/2017

Volume 3
May/Jun

Internet of Things
- Auditing connected, nongeneral-purpose devices (e.g. ICS, biomed)
- Auditing “things”
- Legislation and standards around IoT
- IoT compliance considerations
- API and software assurance
- Privacy implications of IoT
- IoT and asset management
- Managing risk with IoT, e.g., in critical systems such as health care and transportation
- Encryption or lack thereof in IoT; How varying encryption levels affect security, e.g., WiFi, Z-Wave
- Audit and security considerations of IoT PaaS Platforms (e.g., AWS IoT, Xively, Azure IOT)
- Attack surfaces—Specific types of devices and associated risk
- Affects of malware update errors in IoT
- Enterprise IoT value realization
- GEIT and IoT, e.g., IoT risk management using GEIT

1/19/2017

2/22/2017

3/23/2017

3/30/2017

5/1/2017

Volume 4
Jul/Aug

Mobile Workforce
- How does the changing workplace impact culture?
- Creating/defining a culture of security—the human factor
- Mobile workforce security considerations
- Social media risks and rewards
- Auditing social media
- Privacy and the mobile workforce

3/21/2017

4/20/2017

5/24/2017

5/31/2017

7/3/2017

Volume 5
Sep/Oct

Enabling the Speed of Business
- Anticipating threats
- Leveraging security, GEIT and audit to move business forward faster
- Mobile payments and digital wallets
- Blockchain
- Attacks against Bitcoin
- Realizing the full value potential of technology
- Enabling innovation through technology
- Auditing BYOD

5/19/2017

6/20/2017

7/20/2017

7/27/2017

9/1/2017

Volume 6
Nov/Dec

Transforming Data
- Auditing big data in enterprise
- “Dark Data”—discovering, inventorying and cataloging hidden data in enterprise
- Big data analytics and machine learning
- Data “leakage”—unintentional data loss/disclosure
- Implications of mobile and wearables
- Practical big data implementation
- DLP in the era of big data

7/20/2017

8/21/2017

9/21/2017

9/28/2017

11/1/2017


* Drafts Due date refers to the date by which all pending articles for the issue must be received for peer review. These drafts should be in what the author considers final form.
** Articles Due date is the date upon which all final revisions requested by the review committee/ISACA must be completed and submitted to the Journal staff. To learn more about the peer-review processs, please see the author guidelines.