Call for papers: Computation Criminology: computer science methods for crime analysis
Guest editors: Anton Borg and Martin Boldt, Department of Computer Science and Engineering, Blekinge Institute of Technology, Sweden
Law enforcement agencies face different conditions today, as the behaviour of criminals has changed with increased mobility and international connections. This, coupled with demands from more resource-efficient police organizations, as well as the requirements of more proactive approaches (e.g. predictive policing) rather than reactive, requires law enforcement agencies to adopt new methods and approaches to handle their goal of enforcing the law.
In order to adapt to these changing circumstances, law enforcement agencies look towards automating what is often manual labour using computerized tools (e.g. regarding data collection, analytics, forecasting). As such, various computer science methods are being employed within the field of computational criminology.
For this special issue of Security Informatics, original contributions that add to the understanding of how crime can be modelled and analyzed using computer science methods are appreciated. The concept of 'crime' should be interpreted in a broad sense, i.e. not limited to serious crimes. Also, submitted manuscripts should demonstrate both how they improve beyond the current state-of-the-art as well as their usefulness within a law enforcement context.
The scope includes, but is not limited to:
- Models for forecasting crime and measuring impact
- Models for crime pattern recognition
- Comprehensible/transparent models for crime analysis
- Handling class-imbalance and biased samples for crime analysis
- Web-based intelligence monitoring, mining, and analysis
- Social network analysis for crime analysis and investigations
- Visualization techniques for crime analysis and investigation
The deadline for submissions is 30th April 2018, but extensions for proposals will always be considered, and an approximate date of submission should be included in the proposal. Proposals should be sent to the Guest Editors at firstname.lastname@example.org and email@example.com. The proposal should describe the background, method and expected contributions (max 500 words). If successful, the authors will be invited to submit through the web-based submission system. All submissions will be subject to standard blind peer review process by the Security Informatics Editorial Board.
2016 Journal Metrics
24 days from submission to first decision
14 days from acceptance to publication
1912.0 Usage Factor
Social Media Impact
- ISSN: 2190-8532