Skip to content


Call for papers: Computation Criminology: computer science methods for crime analysis

Call for papers: Computation Criminology: computer science methods for crime analysisSecurity Informatics announces a call for papers for a special collection of original contributions that add to the understanding of how crime can be modeled and analyzed using computer science methods.

Read more here


Most accessed articles RSS

View all articles

"Security Informatics aspires to quickly attain top-tier status, and aims to fulfil a unique role: that of providing a bridge between security researchers and practitioners. The contributions and unique perspectives of academic researchers, policy makers, and government and industry IT managers will ensure that the best in research and practice is widely shared in the intelligence and security informatics community."

Hsinchun Chen, Editor-in-Chief

University of Arizona

Aims and scope

Intelligence and Security Informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach (Chen 2006). Security Informatics will publish peer-reviewed articles in areas relevant to ISI research, from the perspectives of Information Technology/ Informatics and related policy considerations. Paper selection will focus on articles that present innovative research ideas and results, report significant application case studies, provide tutorial surveys, and raise awareness of pressing research and application challenges.


2016 Journal Metrics

  • Speed
    24 days from submission to first decision
    14 days from acceptance to publication

    1912.0 Usage Factor

    Social Media Impact
    12 mentions