Receive periodic news and updates relating to SpringerOpen.
Search information pages
About Security Informatics
This page includes information about the aims and scope of Security Informatics, editorial policies, open access and article-processing charges, the peer review process and other information. For details of how to prepare and submit a manuscript through the online submission system, please see the instructions for authors.
Aims & scope
Intelligence and Security Informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach (Chen 2006). Security Informatics will publish peer-reviewed articles in areas relevant to ISI research, from the perspectives of Information Technology/ Informatics and related policy considerations. Paper selection will focus on articles that present innovative research ideas and results, report significant application case studies, provide tutorial surveys, and raise awareness of pressing research and application challenges.
In addition to publishing the highest-quality original security informatics research, Security Informatics is also intended to serve as a bridge between security researchers and practitioners, including both related government agencies and the growing IT-related security industry. The journal provides an excellent opportunity to reach out to an international audience of security-related academic researchers, industry practitioners, and government IT managers and policy makers.
Topics for Security Informatics include the following:
Intelligence Information Sharing and Data/Text/Web Mining for Security
- Intelligence-related knowledge discovery
- Agents and collaborative systems for intelligence sharing
- Information sharing policy and governance
- Privacy and security
- Computational criminology
- Port and cargo security
- Cyber warfare
- Multilingual intelligence gathering and analysis
- Criminal/intelligence data mining and network analysis
- Criminal/intelligence information sharing and visualization
- Spatio-temporal crime and intelligence data analysis
- Deception and intent detection
- Civil liberties issues
Infrastructure Protection and Emergency Response
- Transportation and communication infrastructure protection
- Cyberinfrastructure design and protection
- Disaster prevention, detection, and management
- Emergency response and management
- Border/transportation security systems design and analysis
- Cybercrime monitoring, prevention and analysis
- Bio-agent surveillance and analysis
- Catastrophic terrorism (bio-agents, WMDs) tracking, alerting, and analysis
- Assisting citizens' responses to catastrophic events
- Terrorism risk assessment and economic analysis
- Social and psychological impact of terrorism
- Eco-terrorism, Agro-terrorism, Bio-terrorism
- Terrorism related analytical methodologies and software tools
- Terrorism knowledge portals and databases
- Terrorist incident chronology databases
- Terrorism root cause analysis
- Terrorist/Extremist network analysis (radicalization, recruitment, conducting operations), visualization, and simulation
- Forecasting and countering terrorism
- Measuring the effectiveness of counter-terrorism campaigns
Information Security and Enterprise Risk Management
- Information security management standards
- Information systems security policies
- Behavior issues in information systems security
- Fraud detection
- Cyber crime, botnets, and social impacts
- Corporate going concerns and risks
- Accounting and IT auditing
- Corporate governance and monitoring
- Board activism and influence
- Corporate sentiment surveillance
- Market influence analytics and media intelligence
- Consumer-generated media and social media analytics
All articles published by Security Informatics are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.
Authors of articles published in Security Informatics are the copyright holders of their articles and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate the article, according to the SpringerOpen copyright and license agreement.
For authors who are US government employees or are prevented from being copyright holders for similar reasons, BioMed Central can accommodate non-standard copyright lines. Please contact us if further information is needed.
Open access publishing is not without costs. Security Informatics therefore levies an article-processing charge of £660/$1030/€840 for each article accepted for publication. If the corresponding author's institution is a Member, the cost of the article-processing charge is covered by the membership, and no further charge is payable. In the case of authors whose institutions are Supporter Members, however, a discounted article-processing charge is payable by the author. We routinely waive charges for authors from low-income countries. For other countries, article-processing charge waivers or discounts are granted on a case-by-case basis to authors with insufficient funds. Authors can request a waiver or discount during the submission process. For further details, see our article-processing charge page.
SpringerOpen is working closely with Thomson Reuters (ISI) to ensure that citation analysis of articles published in Security Informatics will be available.
Publication and peer review process
Security Informatics encourages submissions that have not been published previously or submitted simultaneously. Security Informatics will accept submissions of original research that are innovative and high-impact. It will also publish occasional special issues of original research in emerging topic areas.
Security Informatics encourages submissions that meet the following requirements:
- Intelligence, security, and public safety relevance: Submissions need to be relevant to the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach. Innovative, emerging, and real-world applications in ISI are welcome.
- Scientific rigor and contribution: Submissions need to demonstrate academic rigor and contribution to the discipline. Papers need to provide comprehensive literature reviews, analysis, and critique of the relevant field of study. Research questions and hypotheses need to be clearly stated and research design and methodology well articulated. Research testbeds, experiments, and evaluation metrics need to be carefully designed and executed. Managerial and organizational relevance of the research also needs to be presented.
- Societal relevance and impact: We encourage submissions that are relevant and high-impact, especially for the benefit of local/national/international/global security in the physical world and/or cyberspace.
- Innovation and novelty: Submissions need to demonstrate novelty in applications, designs, methodologies, algorithms, or theories. Research needs to be carefully compared with the best previously reported methods or approaches.
Security Informatics will publish papers that are carefully written and are readable by a broader audience instead of specialists doing research in a narrow area. Submissions need to be carefully edited to avoid mistakes and grammatical and typographic errors. Poorly written papers will be automatically rejected by the editor. Security Informatics will discourage excessively long papers (more than 8,000 words). Most papers will be between 5,000 and 7,000 words. It is our goal to motivate the authors to bring out the essence of their research, to make their work easily understood by reviewers and readers, and to allow Security Informatics to include more interesting papers in any given issue.
Papers appearing in Security Informatics are normally original research that has not been published elsewhere. Widely distributed refereed conference papers are considered publications, but technical papers are not. Security Informatics is an open access journal. Authors will retain their copyright under a Creative Commons License, which allow creators to communicate which rights they reserve, and which rights they waive for the benefit of recipients or other creators.
Emerging, relevant, high-impact ISI research is often time critical. The Security Informatics Editorial Board is committed to providing a professional and timely editorial process, as supported by the Springer online submission system . In principle, a successful Security Informatics submission can reach a final ԡcceptԠdecision in 12 months or less from the day of the initial submission.
Authors will be able to check the progress of their manuscript through the submission system at any time by logging into My Security Informatics, a personalized section of the site.
Portability of peer review
In order to support efficient and thorough peer review, we aim to reduce the number of times a manuscript is re-reviewed after rejection from Security Informatics, thereby speeding up the publication process and reducing the burden on peer reviewers. Therefore, please note that, if a manuscript is not accepted for publication in Security Informatics and the authors choose to submit a revised version to another SpringerOpen journal, we will pass the reviews on to the other journal's editors at the authors' request. We will reveal the reviewers' names to the handling editor for editorial purposes unless reviewers let us know when they return their report that they do not wish us to share their report with another SpringerOpen journal.
Please see our reprints website for information about reprinting articles.
Security Informatics will consider supplements based on proceedings (full articles or meeting abstracts), reviews or research. All articles submitted for publication in supplements are subject to peer review. Published supplements are fully searchable and freely accessible online and can also be produced in print. For further information, please contact us.
Any manuscript, or substantial parts of it, submitted to the journal must not be under consideration by any other journal. In general, the manuscript should not have already been published in any journal or other citable form, although it may have been deposited on a preprint server. Authors are required to ensure that no material submitted as part of a manuscript infringes existing copyrights, or the rights of a third party.
Correspondence concerning articles published in Security Informatics is encouraged. A 'post a comment' feature is available on all articles published by Security Informatics. Comments will be moderated by the editorial office (see our Comment policy for further information) and linked to the full-text version of the article, if suitable.
SpringerOpen is a member of the Committee on Publication Ethics (COPE). In order to safeguard the quality of SpringerOpen journal publications, Springer has developed a policy on Publishing Integrity which is in line with the philosophy of COPE.
We follow the principle that we have a prime duty to maintain the integrity of the scientific record. Springer’s Policy on Publishing Integrity addresses:
- Clear definitions of what violation of Publishing Integrity is.
- A manual on how to identify such a violation (in the document referred to as an Act of Misconduct).
- Clear (COPE) examples of what such an Act of Misconduct looks like in practice.
- Clearly defined actions which have to be undertaken by the Editor and Springer when such an Act is a clearly proven fact.
- Q & A – a useful list of Questions and Answers on the definition of Publishing Integrity.
Please find the full document of Springer's Policy on Publishing Integrity here.
Data and materials release
Submission of a manuscript to Security Informatics implies that readily reproducible materials described in the manuscript, including all relevant raw data, will be freely available to any scientist wishing to use them for non-commercial purposes.
Any 'in press' articles cited within the references and necessary for the reviewers' assessment of the manuscript should be made available if requested by the editorial office.
Appeals and complaints
Authors who wish to appeal a rejection or make a complaint should, in the first instance, contact the Editor-in-Chief who will provide details of the journal's complaints procedure.
Security Informatics requires authors to declare any competing financial or other interest in relation to their work. All competing interests that are declared will be listed at the end of published articles. Where an author gives no competing interests, the listing will read 'The author(s) declare that they have no competing interests'.
Security Informatics's publisher, SpringerOpen, is a member of the CrossCheck plagiarism detection initiative. In cases of suspected plagiarism CrossCheck is available to the editors of Security Informatics to detect instances of overlapping and similar text in submitted manuscripts by using the plagiarism detection tool iThenticate. CrossCheck is a multi-publisher initiative allowing screening of published and submitted content for originality.
Citing articles in Security Informatics
Articles in Security Informatics should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.
Article citations follow this format:
Authors: Title. Security Informatics [year], [volume number]:[article number].
e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. Security Informatics 2009, 1:115.
refers to article 115 from Volume 1 of the journal.
Why publish your article in Security Informatics?
Security Informatics's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience. Articles that have been especially highly accessed are highlighted with a 'Highly accessed' graphic, which appears on the journal's contents pages and search results.
Speed of publication
Security Informatics offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through Security Informatics and SpringerOpen.
Online publication in Security Informatics gives authors the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example to relevant databases and papers).
Promotion and press coverage
Articles published in Security Informatics are included in article alerts and regular email updates. Some may be included in abstract books mailed to academics and are highlighted on Security Informatics's pages and on the SpringerOpen homepage.
In addition, articles published in Security Informatics may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in Security Informatics.
Authors of articles published in Security Informatics retain the copyright of their articles and are free to reproduce and disseminate their work (for further details, see the copyright and license agreement.
For further information about the advantages of publishing in a journal from SpringerOpen, please click here.