Aims and scope
Intelligence and Security Informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach (Chen 2006). Security Informatics will publish peer-reviewed articles in areas relevant to ISI research, from the perspectives of Information Technology/ Informatics and related policy considerations. Paper selection will focus on articles that present innovative research ideas and results, report significant application case studies, provide tutorial surveys, and raise awareness of pressing research and application challenges.
In addition to publishing the highest-quality original security informatics research, Security Informatics is also intended to serve as a bridge between security researchers and practitioners, including both related government agencies and the growing IT-related security industry. The journal provides an excellent opportunity to reach out to an international audience of security-related academic researchers, industry practitioners, and government IT managers and policy makers.
Topics for Security Informatics include the following:
Intelligence Information Sharing and Data/Text/Web Mining for Security
- Intelligence-related knowledge discovery
- Agents and collaborative systems for intelligence sharing
- Information sharing policy and governance
- Privacy and security
- Computational criminology
- Port and cargo security
- Cyber warfare
- Multilingual intelligence gathering and analysis
- Criminal/intelligence data mining and network analysis
- Criminal/intelligence information sharing and visualization
- Spatio-temporal crime and intelligence data analysis
- Deception and intent detection
- Civil liberties issues
Infrastructure Protection and Emergency Response
- Transportation and communication infrastructure protection
- Cyberinfrastructure design and protection
- Disaster prevention, detection, and management
- Emergency response and management
- Border/transportation security systems design and analysis
- Cybercrime monitoring, prevention and analysis
- Bio-agent surveillance and analysis
- Catastrophic terrorism (bio-agents, WMDs) tracking, alerting, and analysis
- Assisting citizens' responses to catastrophic events
- Terrorism risk assessment and economic analysis
- Social and psychological impact of terrorism
- Eco-terrorism, Agro-terrorism, Bio-terrorism
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Terrorist/Extremist network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
- Forecasting and countering terrorism
- Measuring the effectiveness of counter-terrorism campaigns
Information Security and Enterprise Risk Management
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime, botnets, and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics
Why publish your article in Security Informatics?
Security Informatics's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience.
Speed of publication
Security Informatics offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through Security Informatics and SpringerOpen.
Online publication in Security Informatics gives you the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example, to PubMed, to sequence and other databases, and to other articles).
Promotion and press coverage
Articles published in Security Informatics are included in article alerts and regular email updates.
In addition, articles published in Security Informatics may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in Security Informatics.
Authors of articles published in Security Informatics retain the copyright of their articles and are free to reproduce and disseminate their work (for further details, see the copyright and license agreement).
For further information about the advantages of publishing in a journal from SpringerOpen, please click here.
All articles published by Security Informatics are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.
As authors of articles published in Security Informatics you are the copyright holders of your article and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate your article, according to the SpringerOpen copyright and license agreement.
For those of you who are US government employees or are prevented from being copyright holders for similar reasons, SpringerOpen can accommodate non-standard copyright lines. Please contact us if further information is needed.
Open access publishing is not without costs. Security Informatics therefore levies an article-processing charge of £695/$1085/€885 for each article accepted for publication. If the corresponding author's institution participates in our open access membership program, some or all of the publication cost may be covered (more details available on the membership page). We routinely waive charges for authors from low-income countries. For other countries, article-processing charge waivers or discounts are granted on a case-by-case basis to authors with insufficient funds. Authors can request a waiver or discount during the submission process. For further details, see our article-processing charge page.
Springer Open provides a free open access funding support service to help authors discover and apply for article processing charge funding. Visit our OA funding and policy support page to view our list of research funders and institutions that provide funding for APCs, and to learn more about our email support service.
The full text of all articles is deposited in digital archives around the world to guarantee long-term digital preservation. You can also access all articles published by SpringerOpen on SpringerLink.
We are working closely with relevant indexing services including PubMed Central and Web of Science (Thomson Reuters) to ensure that articles published in Security Informatics will be available in their databases when appropriate.
Security Informatics operates a single-blind peer-review system, where the reviewers are aware of the names and affiliations of the authors, but the reviewer reports provided to authors are anonymous.
The benefit of single-blind peer review is that it is the traditional model of peer review that many reviewers are comfortable with, and it facilitates a dispassionate critique of a manuscript.
Submitted manuscripts will generally be reviewed by two or more experts who will be asked to evaluate whether the manuscript is scientifically sound and coherent, whether it duplicates already published work, and whether or not the manuscript is sufficiently clear for publication. The Editors will reach a decision based on these reports and, where necessary, they will consult with members of the Editorial Board.
All manuscripts submitted to Security Informatics should adhere to SpringerOpen's editorial policies.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Citing articles in Security Informatics
Articles in Security Informatics should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.
Article citations follow this format:
Authors: Title. Security Informatics [year], [volume number]:[article number].
e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. Security Informatics 2009, 1:115.
refers to article 115 from Volume 1 of the journal.
Appeals and complaints
If you wish to appeal a rejection or make a complaint you should, in the first instance, contact the Editor who will provide details of the journal's complaints procedure.