Skip to main content

Journals in Security

Cyber Security and Applications

  • ISSN: 2772-9184
To defend against various cyber-attacks, the companies and organizations should have right policies and procedures in place. Moreover, it is essential to develop new quantum-safe encryption algorithms and modern tools which can withstand from quantum computer-based attacks. This Cyber Security and Applications (CSA) journal focuses on cyber breaches, cyber-attacks, quantum computing based encryption and decryption techniques and cyber defense tools for improving level of cyber security.In addition to this, CSA also welcomes the researchers to submit the papers related to advance methods and tools for improving the cyber security in the field of Information and Communication Technology (ICT). Therefore, the CSA journal seeks innovative papers in the field of cyber security. CSA also accepts the substantially extended version of the conference papers in the field of cyber security.Topics of interest include, but are not limited to the following:Cyber attacksSoftware and Hardware SecuritySecurity issues in Intelligent Transportation Systems (ITS)Machine learning mechanisms for cyber securityKey generation and key distribution schemesModern tools for improving cyber securityEmerging trends in cyber securityAuthenticated Key Agreement ProtocolsCyber security in Internet of Things (IoT)Cyber security in CloudQuantum-safe encryption algorithmsQuantum-safe digital signature schemesQuantum-safe key management mechanismsEditorial Board
Cyber Security and Applications

Forensic Science International: Digital Investigation

  • ISSN: 1742-2876
  • 5 Year impact factor: 2.3
  • Impact factor: 2
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-criminal investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-risk management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.sciencedirect.com/science/article/pii/S1742287618301713.Scientific practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Application analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy
Forensic Science International: Digital Investigation

Forensic Science International: Digital Investigation

  • ISSN: 2666-2817
  • 5 Year impact factor: 2.3
  • Impact factor: 2
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-criminal investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-risk management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.sciencedirect.com/science/article/pii/S1742287618301713.Scientific practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Application analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy
Forensic Science International: Digital Investigation

Forensic Science International: Digital Investigation

  • ISSN: 2666-2825
  • 5 Year impact factor: 2.3
  • Impact factor: 2
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-criminal investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-risk management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.sciencedirect.com/science/article/pii/S1742287618301713.Scientific practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Application analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy
Forensic Science International: Digital Investigation

Forensic Science International: Synergy

  • ISSN: 2589-871X
An international open access journal showcasing the most cutting-edge interdisciplinary research and policy and management analysis.Preferred journal of the American Society of Crime Laboratory Directors (ASCLD).Forensic Science International: Synergy is a gold open access journal - the first ever gold open access journal in forensic science - which welcomes significant and insightful cross-disciplinary research. The journal's aim is to advance and support forensic science while exceeding its expectations for excellence. By being freely available to anyone, we seek to promote and support open discourse across diverse areas of interest, avocation, and geography. Papers are invited from all forensic sciences and influencing disciplines, including but not limited to the humanities, biomedical sciences, life sciences, social sciences, and the law. Cross-disciplinary collaboration promotes innovative approaches, encourages systems-level perspectives, and seeds the literature with insightful opportunities.Because the good management of science can be as important as the science itself, the journal welcomes articles on issues related to forensic science policy and management. Management, human resources, economic studies, policy implications of new methods or technology, and any other work intended to improve the effectiveness, efficiency, quality, and operations of forensic science laboratories as well as to the education and training of forensic scientists. In addition, the journal welcomes manuscripts on the governmental and institutional policies that affect the practice and management of forensic science.Our goal is to publish quality work quickly so that information and results that have the potential to affect the public or a criminal justice system can be distributed, discussed, and incorporated into future research or applications. We will consider the following types of manuscripts:Case ReportsOriginal Research (Regular Articles)Perspective Pieces (Invitation Only)Practitioner/Technical NotesReview ArticlesForensic science is central to modern criminal justice systems. It supports investigations, demonstrates associations between people, places, and things involved in criminal activity, and exonerates the innocent. Forensic services are sciences integral to a just society governed through rule of law, it is unarguably a public good and should be accessible to anyone. Transparency is key to good science, rational governance, and equitable justice.Forensic Science International: Synergy adheres to strict ethical publication guidelines and actively supports a culture of inclusive and representative publication. For any submission enquiries, please contact the Editor-in-Chief.The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of:Forensic Science InternationalForensic Science International: Animals and EnvironmentsForensic Science International: Digital InvestigationForensic Science International: GeneticsForensic Science International: Genetics Supplement SeriesForensic Science International: Mind and LawForensic Science International: ReportsForensic Science International: Synergy
Forensic Science International: Synergy

Heliyon

  • ISSN: 2405-8440
  • 5 Year impact factor: 3.9
  • Impact factor: 3.4
Heliyon considers research from all areas of the physical, applied, life, social and medical sciences. We publish manuscripts reporting scientifically accurate and valuable research, which adheres to accepted ethical and scientific publishing standards. As such Heliyon publishes new insights as well as extensions on existing theories, negative/null results and replication studies.Submissions covering arts, humanities and law are not considered in Heliyon. Authors of these submissions are encouraged to submit directly to our partner journal Social Sciences & Humanities Open.Heliyon classifies manuscripts/articles into different sections based on the research topic discussed. Some sections exclude certain types of studies from their scope. To know more and to see the kind of manuscripts the various sections publish, please visit: https://www.cell.com/heliyon/sectionsA dedicated in-house editorial office team, internal editors as well as external academic section and associate editors handle your manuscript and manage the publication process, giving your research the editorial support and quality control it deserves.If it's important to you, it's important to us. Submit your paper today.
Heliyon

Journal of Economic Criminology

  • ISSN: 2949-7914
Journal of Economic Criminology aims to be the premier outlet for peer-reviewed theoretical and empirical work on economic criminology. This interdisciplinary journal welcomes manuscript submissions on a broad array of topics, including various types of economic crime, explanations of offending and victimisation, crime prevention, public and private policing, compliance, legal systems, justice, among others. It encourages submissions that push theoretical boundaries for issues salient to economic criminologists and welcomes rigorous quantitative, qualitative, and mixed-methods empirical research. The journal aims to be geographically diverse in terms of the backgrounds of researchers and the subject matter of the research. It encourages submissions from a range of disciplines, including, business and management, criminology, computer science, economics, law, political science, sociology etc. Submissions that link their contribution to economic crime/economic criminology and attempt to reflect upon how their contribution enhance the Journal’s interdisciplinary discourse on economic crime are strongly encouraged.The journal aims to facilitate discussion among different academic disciplines and practice areas by providing an active forum where scholars and professionals from other disciplines are able to understand the contribution and potentially use it to enrich their work.Journal of Economic Criminology welcomes submissions which consider the following topics: • Fraud, Corruption, Bribery, Money Laundering, Global Sanctions and Terrorism Financing • Intellectual Property Crimes, Price-Fixing and Cartels • Preventing economic crime and corporate compliance • Corporate Economic Crime • Illicit Financial Flow • Financial Intelligence and Related Investigations • Economic Crime Measurement • Sanctions against economic crime criminals • Victims of economic crime
Journal of Economic Criminology

Journal of Safety Science and Resilience

  • ISSN: 2666-4496
  • 5 Year impact factor: 4.8
  • Impact factor: 3.7
The Journal of Safety Science and Resilience (JSSR) is a scholarly journal that publishes scientific research on the practice of safety science and resilience as well as latest improvements in the field. This area emphasizes science and technology in natural disasters and man-made and environmental hazards, including 1) monitoring based on sensor networks, video technology, and information and communication systems; 2) early warning based on experiments, modeling, and simulation; 3) resilience analysis to improve the resilience of critical infrastructure systems and communities; 4) data analysis and the evaluation of emergent events in social networks; and 5) optimization analysis of responses to accidents and disasters.The journal focuses primarily on original research papers, but also welcomes state-of-the-art review papers and first-hand case histories on accidents and disasters that are of special significance. The journal also aims to be a reference and a powerful tool for all those who are professionally active and/or interested in the methods and applications of safety science and resilience. Submitted papers will be peer-reviewed and must significantly contribute to safety and resilience in general or to specific application areas.Topics of interest include, but are not limited to the following:Emergency-related theory, methodology, science and technologyExperimental and engineering practice for safety scienceExperiments and simulations for safety science and resilienceInformation and communication technology systems including computer systems, networks, real-time and embedded systems, and mobile and intelligent agentsAI for emergency managementData mining, crowd sensing, event detection, opinion mining and sentiment analysis for safety and resiliencePrediction and decision for safety science and resilienceEmergency resource planning and schedulingEmergency preparedness and emergency recoveryCommunity and urban resilienceEmergency management for public healthVideo surveillance and security scienceHuman psychology, emotion, cognition, behavior and decision-making for emergency managementSafety management in work placeEditorial Board
Journal of Safety Science and Resilience

Space Policy

  • ISSN: 0265-9646
  • 5 Year impact factor: 2.1
  • Impact factor: 2
Space Policy is an international, interdisciplinary journal which draws on the fields of international relations, economics, history, aerospace studies, security studies, development studies, political science and ethics to provide discussion and analysis of space activities in their political, economic, industrial, legal, cultural and social contexts.Alongside full-length papers, which are subject to a double-blind peer review system, the journal publishes opinion pieces, case studies and short reports and, in so doing, it aims to provide a forum for the exchange of ideas and opinions and a means by which authors can alert policy makers and international organizations to their views. Space Policy is also a journal of record, reproducing, in whole or part, official documents such as treaties, space agency plans or government reports relevant to the space community. Views expressed in the journal are not necessarily those of the editors or members of the editorial board.Benefits to authors We also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services.Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our Support Center
Space Policy