Call for papers: Computation Criminology: computer science methods for crime analysis
Security Informatics announces a call for papers for a special collection of original contributions that add to the understanding of how crime can be modeled and analyzed using computer science methods.
"Security Informatics aspires to quickly attain top-tier status, and aims to fulfil a unique role: that of providing a bridge between security researchers and practitioners. The contributions and unique perspectives of academic researchers, policy makers, and government and industry IT managers will ensure that the best in research and practice is widely shared in the intelligence and security informatics community."
Hsinchun Chen, Editor-in-Chief
University of Arizona
Aims and scope
Intelligence and Security Informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach (Chen 2006). Security Informatics will publish peer-reviewed articles in areas relevant to ISI research, from the perspectives of Information Technology/ Informatics and related policy considerations. Paper selection will focus on articles that present innovative research ideas and results, report significant application case studies, provide tutorial surveys, and raise awareness of pressing research and application challenges.
2016 Journal Metrics
24 days from submission to first decision
14 days from acceptance to publication
1912.0 Usage Factor
Social Media Impact
- ISSN: 2190-8532