In October 2025, SIGSEC leadership asked its group’s members to evaluate the peer-reviewed outlets below based on the ‘bucket’ definitions that follow:
Security- and Privacy-specific Outlets considered:
- ACM Transactions on Privacy and Security
- Computer Fraud & Security
- Computer Law & Security Review
- Computers & Security
- Cybersecurity
- Forensic Science International: Digital Investigation (previously Digital Investigation)
- IEEE Security & Privacy
- IEEE Transactions on Dependable and Secure Computing
- IEEE Transactions on Information Forensics and Security
- Information & Computer Security
- Information & Security
- Information Security Journal: A Global Perspective
- International Journal of Information Privacy, Security and Integrity
- International Journal of Information Security
- Journal of Computer Security
- Journal of Cybersecurity
- Journal of Cybersecurity and Privacy
- Journal of Data Protection and Privacy
- Journal of Global Security Studies
- Journal of Information Security and Applications
- Journal of Information Systems Security
- Journal of Privacy and Confidentiality
- Organizational Cybersecurity: Practice, Process & People
- Security and Privacy
Ranking definitions:
-
Tier 1 - These journals represent the highest standards of scholarly excellence in our security subfield. They are widely recognized as authoritative within our subfield and often shape the direction of research and practice.
-
Tier 2 - These journals publish robust, relevant, and well-executed research that contributes meaningfully to our subfield. They are respected and frequently cited, though not always considered “flagship” in our subfield.
-
Tier 3 - These journals serve specialized audiences, emerging areas, or practical applications. While they may lack the prestige of higher tiers, they offer valuable contributions to specific communities or domains.
-
Other / Unranked / Periphery - These journals fall outside the mainstream academic ranking systems or whose relevance, rigor, or visibility is limited or unclear. They may serve niche audiences, emerging formats, or be more practitioner- or industry-oriented.
SIGSEC leadership finalized its recommendations based on the combination of three major components:
-
SIGSEC members’ feedback (n=35)
-
quantitative metrics including but not limited to SNIP_24, IF, SJR, h-index, and ABDC rankings (where applicable)
-
editorial and advisory board composition.
Resulting Recommendation: SIGSEC leadership believes that the following outlets (listed alphabetically) “are especially relevant to [our] constituency and worthy of broader AIS recognition extending beyond the basket of 8”:
- ACM Transactions on Privacy and Security
- Computers & Security
- Cybersecurity
- IEEE Security & Privacy
- IEEE Transactions on Dependable and Secure Computing
- IEEE Transactions on Information Forensics and Security
- Information & Computer Security
- Journal of Cybersecurity