Security and Privacy Approaches Against Cyber Threats: Innovations, Challenges, and Practical Solutions

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".

Deadline for manuscript submissions: 30 July 2025 | Viewed by 1179

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, Engineering & the Build Environment, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Interests: cybersecurity; distributed ledger technology; privacy-preserving machine learning

E-Mail Website
Guest Editor
Department of Information Technology, Cybersecurity and Computer Science, The American College of Greece, 15342 Athens, Greece
Interests: cybersecurity; adversarial machine learning; cloud computing security; human factors in cyber security; distributed ledgers; steganography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Background:

In the face of an increasingly complex and pervasive cyber threat landscape, the need for robust security and privacy approaches has never been greater. Cybercriminals are employing more sophisticated techniques to exploit vulnerabilities, targeting not only data but also cyber physical systems, industrial control systems, and critical infrastructure. At the same time, the challenge of preserving privacy in an environment where data are continuously collected and processed has become a pressing concern. Addressing these challenges requires innovative approaches that defend against current threats but also anticipate future ones. This Special Issue seeks to deepen the understanding of these threats and explore practical, effective strategies for protecting systems and data.

Goal:

The main goal of this Special Issue is to explore and disseminate innovative security and privacy approaches specifically designed to counteract the evolving landscape of cyber threats. We aim to bring together cutting-edge research that provides new methods, frameworks, and technologies for defending against cyber threats while safeguarding privacy. Contributions should focus on practical implementations and real-world applications of these approaches, offering insights into their effectiveness and scalability. We particularly encourage submissions that address the dual challenge of maintaining security and privacy simultaneously, providing comprehensive solutions to modern cyber threats.

Scope and Information for Authors:

This Special Issue welcomes contributions that address a wide array of security and privacy approaches aimed at countering cyber threats. We seek research articles, reviews, and case studies that propose and evaluate innovative methods for threat detection, prevention, and response, as well as privacy-preserving techniques in the face of these threats. Specific topics of interest include, but are not limited to, the following:

  • Advanced threat detection and response strategies;
  • Novel methodologies for threat detection and mitigation;
  • Privacy-preserving technologies in cybersecurity;
  • Privacy-enhancing technologies in the context of cyber threats;
  • Integrated approaches to security and privacy;
  • Threat intelligence frameworks and their practical applications;
  • Risk management and threat modeling;
  • Encryption and data protection against cyber threats;
  • Cyber threat intelligence (CTI) and proactive defense mechanisms;
  • Incident response and recovery strategies;
  • Security and privacy in emerging technologies (IoT, blockchain, AI);
  • Regulatory and policy approaches to enhance security and privacy.

We encourage submissions that introduce new approaches but also provide real-world case studies and evaluations of existing methods. Submissions should present significant advancements, innovative solutions, or comprehensive analyses that contribute to the ongoing effort to counteract cyber threats while preserving privacy.

Description:

As cyber threats continue to evolve, the development of security and privacy approaches that can effectively counter these threats is of paramount importance. This Special Issue invites contributions that explore the latest innovations in this field, focusing on approaches that offer practical solutions to the challenges of securing systems and protecting privacy against cyber threats. We are particularly interested in research that bridges the gap between theoretical advancements and real-world applications, offering insights into how these approaches can be implemented and scaled in diverse environments.

We invite researchers and practitioners to contribute their original research, reviews, and case studies to this Special Issue. All submissions will undergo a rigorous peer-review process to ensure the quality and relevance of the contributions.

We look forward to receiving your submissions and believe that this Special Issue will significantly contribute to the advancement of practical and innovative approaches to securing systems and preserving privacy against cyber threats.

Dr. Pavlos Papadopoulos
Dr. Nikolaos Pitropakis
Prof. Dr. Sokratis Katsikas
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • privacy
  • cyber threat mitigation
  • defensive strategies
  • threat intelligence
  • data protection
  • incident response
  • real-world implementations

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 7224 KiB  
Article
Exploring Privacy Leakage in Platform-Based Enterprises: A Tripartite Evolutionary Game Analysis and Multilateral Co-Regulation Framework
by Peng Xu, Jiaxin Li and Zhuo Sun
Information 2025, 16(3), 193; https://doi.org/10.3390/info16030193 - 2 Mar 2025
Viewed by 629
Abstract
Currently, some platform-based enterprises are selling users’ private information to capture high revenue, which poses a great threat to users’ privacy and security and also poses a challenge to the work of regulators. This paper constructs a tripartite evolutionary game model among platform-based [...] Read more.
Currently, some platform-based enterprises are selling users’ private information to capture high revenue, which poses a great threat to users’ privacy and security and also poses a challenge to the work of regulators. This paper constructs a tripartite evolutionary game model among platform-based enterprises, users, and regulators by combining theories of daily activities. This paper explores the equilibrium strategy for the leakage of users’ privacy information on online platforms under the concept of multiparty governance and designs four simulation experiments based on the revenue intervals of platform-based enterprises’ decisions. Finally, the model is validated by means of simulation. The results show that when platform-based enterprises make less profit from compromising users’ privacy, users are motivated to participate in shared governance with minimal incentives from the regulator. Regulators can effectively deter privacy leakage by fining platform-based enterprises for leaking user privacy information and requiring them to compensate users for their losses. At this point, they can achieve effective control over privacy leakage by using traditional regulation. When platform-based enterprises make high profits from leaking users’ privacy, they will adhere to their privacy leaking strategy. At this point, privacy security is at its most serious, and users’ privacy rights are not effectively protected. Users and regulators will tend to cooperate to form a multiparty regulatory system, but this does not influence the strategy choice of platform-based enterprises. Full article
Show Figures

Figure 1

Back to TopTop