View all articles

View all articles

Aims and scope

Intelligence and Security Informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach (Chen 2006). Security Informatics will publish peer-reviewed articles in areas relevant to ISI research, from the perspectives of Information Technology/ Informatics and related policy considerations. Paper selection will focus on articles that present innovative research ideas and results, report significant application case studies, provide tutorial surveys, and raise awareness of pressing research and application challenges.

Open thematic series

Information visualization and visual analytics for crime analysis and prediction

Information visualization techniques have been used to visualize spatiotemporal crime data for numerous analysis and investigative purposes. Recent applications of visual analytics techniques on big crime data help crime analysts to discover crime patterns and predict future crimes. New visualization techniques are also suggesting new ways of exploring crime data. This thematic series on “Information Visualization and Visual Analytics for Crime Analysis and Prediction” is organized to foster this growing interest.

CyberSecurity research and education

Cyberspace has become a powerful, virtual environment that provides a common landscape for government, commerce, science, education, and communication. However, cyber attacks are increasing and often lead to disruptions in telecommunications, banking, utilities, data storage, and transportation services. This thematic series invites original research articles from a security informatics perspective on a wide range of cybersecurity-related topics such as cyber forensics, social media analysis for cybersecurity, and training and education.

JISIC 2014

The IEEE Joint Intelligence and Security Informatics Conference was held in the Hague, September 24-26, 2014. This special issue is devoted to papers selected from the JISIC conference which have expanded their scope and research to produce new findings.

Forthcoming article collections

Formal Concept Analysis in Intelligence and Security Informatics
Formal Concept Analysis (FCA) emerged in the 1980's from attempts to restructure lattice theory in order to promote better communication between lattice theorists and potential users of lattice theory. Since its early years, Formal Concept Analysis has developed into a research field in its own right with a thriving theoretical community and a rapidly expanding range of applications in information and knowledge processing including visualization, data analysis (mining) and knowledge management.

Submissions closed

Text Processing for Crime Analysis and Predictive Policing
Criminal incident data (e.g., locations and times of assaults in a region) play a key role in security informatics; however, a substantial amount of information concerning such incidents exists in the form of unstructured text (e.g., an officer's written narrative, news reports, etc.). This special issue will target work that combines these two crucial information sources, leading to a better understanding of criminal incident patterns.

Submissions closed