0.2(top 100%)
impact factor
1.8K(top 10%)
papers
847(top 50%)
citations
9(top 50%)
h-index
0.2(top 100%)
impact factor
2.4K
all documents
943
doc citations
14(top 50%)
g-index

Top Articles

#TitleJournalYearCitations
1Blockchain Double Bubble or Double Trouble?Itnow201636
2Covid-19 and Digital Education: a Catalyst For Change?Itnow202130
3Can Blockchain Revolutionise EPRs?Itnow201620
4The Art of ProgrammingItnow201117
5Whither enterprise architecture?Itnow200912
6What is Big Data?Itnow201311
7How Covid-19 Changed Computer Science EducationItnow202211
8Cyber Security StrategyItnow201210
9The Benefits of Computational ThinkingItnow201510
10Repositioning BCS Degree AccreditationItnow202010
11Creative Science Injecting Innovation into the IT IndustryItnow20159
12Beyond NFTs: A Possible Future for Digital ArtItnow20219
13The Metaverse: Is it the Future?Itnow20228
14Podcasting in higher educationItnow20087
15Bring Your Own DeviceItnow20127
16Cybersecurity Report 2020Itnow20207
17The changing landscapeItnow20066
18Interview prepItnow20096
19Turing TestItnow20126
20Ethics in Emerging TechnologyItnow20146
21Key Points in 2010Itnow20176
22Maintaining the Focus on Cybersecurity in UK Higher EducationItnow20196
23Virtual worlds: today and in the futureItnow20065
24Website BlockingItnow20115
25New for MembersItnow20125
26Formal methods in LARGE-SCALE computing systemsItnow20135
27Virtual LeadershipItnow20165
28Health WearablesItnow20165
29Cybersecurity in CS DegreesItnow20165
30Demystifying the Dark WebItnow20175
31IoT, Malware and SecurityItnow20175
32Blockchain from Hype to HelpItnow20185
33The Morris Worm at 30Itnow20195
34Pay per viewItnow20064
35It's in the gameItnow20074
36The Computer JournalItnow20114
37to Byod or ... not to ByodItnow20134
38Embracing the 5th WaveItnow20134
39Ubiquitous Computing Riding the Next WaveItnow20144
40Evolutionary Personal Information ManagementItnow20144
41State of Play ReportItnow20154
42Free Wilkes Award PapersItnow20154
43BCS Awards WinnersItnow20164
44Future SkillsItnow20164
45Key Points in 2012Itnow20174
46Key Points in 2016Itnow20174
47Key Points in 2013Itnow20174
48The Secret of Machine LearningItnow20184
49NIS Directive and the Security of Critical ServicesItnow20184
50Spotlight on Christopher CurryItnow20184