• Hsinchun Chen, University of Arizona

Associate Editors-in-Chief

  • Chris Yang, Drexel University
  • Daniel Zeng, University of Arizona


There has been an error retrieving the data. Please try again.


Hsinchun Chen

"Security Informatics aspires to quickly attain top-tier status, and aims to fulfill a unique role: that of providing a bridge between security researchers and practitioners. The contributions and unique perspectives of academic researchers, policy makers, and government and industry IT managers will ensure that the best in research and practice is widely shared in the intelligence and security informatics community."

Security Informatics
Hsinchun Chen, University of Arizona

About SpringerOpen

SpringerOpenSpringerOpen is Springer’s new suite of open access journals which will cover all disciplines. SpringerOpen journals are fully and immediately open access and will publish articles under the Creative Commons Attribution license. This makes it easy for authors to fully comply with open access mandates and retain copyright. SpringerOpen journals combine open access and our expertise in delivering high-quality and rapid publications, from online submission systems and in-depth peer review to an efficient, author-friendly production process.

Aims & scope


Intelligence and Security Informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national and homeland security related applications, through an integrated technological, organizational, and policy-based approach (Chen 2006). Security Informatics will publish peer-reviewed articles in areas relevant to ISI research, from the perspectives of Information Technology/ Informatics and related policy considerations. Paper selection will focus on articles that present innovative research ideas and results, report significant application case studies, provide tutorial surveys, and raise awareness of pressing research and application challenges.

In addition to publishing the highest-quality original security informatics research, Security Informatics is also intended to serve as a bridge between security researchers and practitioners, including both related government agencies and the growing IT-related security industry. The journal provides an excellent opportunity to reach out to an international audience of security-related academic researchers, industry practitioners, and government IT managers and policy makers.

Open thematic series

Information visualization and visual analytics for crime analysis and prediction

Information visualization techniques have been used to visualize spatiotemporal crime data for numerous analysis and investigative purposes. Recent applications of visual analytics techniques on big crime data help crime analysts to discover crime patterns and predict future crimes. New visualization techniques are also suggesting new ways of exploring crime data. This thematic series on “Information Visualization and Visual Analytics for Crime Analysis and Prediction” is organized to foster this growing interest.

CyberSecurity research and education

Cyberspace has become a powerful, virtual environment that provides a common landscape for government, commerce, science, education, and communication. However, cyber attacks are increasing and often lead to disruptions in telecommunications, banking, utilities, data storage, and transportation services. This thematic series invites original research articles from a security informatics perspective on a wide range of cybersecurity-related topics such as cyber forensics, social media analysis for cybersecurity, and training and education.

JISIC 2014

The IEEE Joint Intelligence and Security Informatics Conference was held in the Hague, September 24-26, 2014. This special issue is devoted to papers selected from the JISIC conference which have expanded their scope and research to produce new findings.

Forthcoming article collections

Formal Concept Analysis in Intelligence and Security Informatics

Formal Concept Analysis (FCA) emerged in the 1980's from attempts to restructure lattice theory in order to promote better communication between lattice theorists and potential users of lattice theory. Since its early years, Formal Concept Analysis has developed into a research field in its own right with a thriving theoretical community and a rapidly expanding range of applications in information and knowledge processing including visualization, data analysis (mining) and knowledge management.

Submissions closed

Special issue on Biologically inspired analysis of social systems: A Security Informatics Perspective

This special issue has been motivated by a series of workshops recently hosted by the Department of Homeland Security which recognized the potential of biologically inspired methods for security. We are currently inviting submissions from a variety of topics.

Submissions closed

Text Processing for Crime Analysis and Predictive Policing

Criminal incident data (e.g., locations and times of assaults in a region) play a key role in security informatics; however, a substantial amount of information concerning such incidents exists in the form of unstructured text (e.g., an officer's written narrative, news reports, etc.). This special issue will target work that combines these two crucial information sources, leading to a better understanding of criminal incident patterns.

Submissions closed

Springer Knight
Submit a manuscript Sign up for article alerts Contact us Support

SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

Indexed by

  • Google Scholar
  • OCLC
  • Summon by Serial Solutions

View all

ISSN: 2190-8532