Skip to main content

Journals in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Analytic Methods in Accident Research

    • ISSN: 2213-6657
    Analytic Methods in Accident Research publishes manuscripts that deal with the development and/or application of innovative statistical and econometric methods to the study of vehicle crashes and other transportation and non-transportation-r... accidents. The intent of the journal is to demonstrate how such innovative methodological approaches can be used to provide new insights and quantification of the factors that affect the frequency and severity of accidents - thus providing new guidance for the implementation of appropriate countermeasures. While the focus of the journal is on the underlying analytic approach, acceptable application areas include all elements of transportation safety (road, pedestrian, air, rail, and water safety), construction safety, and any area of study where the unintended consequences of human behavior, machine failures or system failures result in property damage and/or bodily injury.
  • Forensic Science International: Digital Investigation

    • ISSN: 2666-2817
    FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy
  • Forensic Science International: Digital Investigation

    • ISSN: 2666-2825
    FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy
  • Forensic Science International: Digital Investigation

    • ISSN: 1742-2876
    FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy
  • Research in Transportation Business & Management

    • ISSN: 2210-5395
    Research in Transportation Business & Management (RTBM) will publish research on international aspects of transport management such as business strategy, communication, sustainability, finance, human resource management, law, logistics, marketing, franchising, privatisation and commercialisation.Re... in Transportation Business & Management welcomes proposals for themed volumes from scholars in management, in relation to all modes of transport. Issues should be cross-disciplinary for one mode or single-disciplinary for all modes. We are keen to receive proposals that combine and integrate theories and concepts that are taken from or can be traced to origins in different disciplines or lessons learned from different modes and approaches to the topic. By facilitating the development of interdisciplinary or intermodal concepts, theories and ideas, and by synthesizing these for the journal's audience, we seek to contribute to both scholarly advancement of knowledge and the state of managerial practice.Potential volume themes include:Sustainabili... and Transportation ManagementTransport Management and the Reduction of Transport's Carbon FootprintMarketing Transport/Branding TransportationBenchm... Performance Measurement and Best Practices in Transport OperationsFranchisin... Concessions and Alternate Governance Mechanisms for Transport OrganisationsLogisti... and the Integration of Transportation into Freight Supply ChainsRisk Management (or Asset Management or Transportation Finance or ...): Lessons from Multiple ModesEngaging the Stakeholder in Transportation GovernanceReliabilit... in the Freight SectorTo submit a volume proposal, please contact the Journal Editors: Silvio Nocera, University of Venice ([email protected]) and Lucy Budd, University of Sydney Business School ([email protected]...
  • Annals of Tourism Research

    • ISSN: 0160-7383
    Annals of Tourism Research is a leading social science journal committed to advancing scholarly research in the field of tourism. The journal embraces a full range of social science disciplines and promotes multidisciplinary, interdisciplinary, and transdisciplinary research that expands the frontiers of tourism knowledge. Driven by the ambition of addressing global challenges in alignment with the United Nations Sustainable Development Goals (SDGs), the journal aims to extend the influence of tourism scholarship beyond academia, fostering its real-world impact on industry practices and public policy. Submissions to Annals of Tourism Research are expected to demonstrate pioneering theory building, methodological innovation, and/or paradigm shifting approaches. The journal publishes a range of formats to support diverse voices and avenues of communication: full-length research articles, research notes, commentaries, and viewpoints. We also encourage contributions to Annals of Tourism Research’s companion journal: Annals of Tourism Research Empirical Insights.
  • Case Studies on Transport Policy

    • ISSN: 2213-624X
    A Journal of the World Conference on Transport Research SocietyTransport policy is a multidisciplinary field where engineering, economics, sociology and law must come together in well-articulated and effective solutions. Despite being a field of effective intervention, most scientific publications address transport policy with a theoretical and often abstract approach, making its understanding difficult for non-senior academics and even more opaque for practitioners. While the merits of case study methods both for undergraduate and graduate teaching are recognised, academics struggle to find empirical material that provides objective and operational illustration of the theories and approaches lectured. This is a major barrier not only in the teaching context but also for practitioners.Case Studies on Transport Policy covers this gap by providing a repository of relevant material to support teaching and transferability of experiences. Observation of field experience highlighting the details and drawbacks of implementation is invaluable to show how Transport Policy can be applied in the operational field, maintaining consistency with strategic options. Teaching with case studies introduces students to challenges they may face in the real world, and provides a very rich learning method for executive training at every institutional level. For practitioners, and specially governments, case studies are a powerful tool to show the potential benefits from policy measures and packages.Case Studies on Transport Policy and its sister journal Transport Policy provide a valuable reference for the specialised study of transport policy offering in-depth theoretical analysis and detailed case study description and analysis, and in this way providing very complete material for decision makers planners and practitioners to undertake transferability of experiences.
  • Transport Policy

    • ISSN: 0967-070X
    The official journal of the World Conference on Transport Research Society (WCTRS)Transport Policy is an international refereed journal aimed at improving quality of transport policy and strategy analysis, designing and sharing innovative policy and management practices, and application bridging the gap between theory and practice in transport. Its subject areas reflect the concerns of policymakers in government, management strategists in industry, and the public at large, providing independent, original and rigorous analysis to understand how policy and strategy decisions have been made, monitor their effects, and suggest how they may be improved.Transport Policy covers the entire transport sector including all modes: air, maritime, urban, intercity, domestic and international transport economics, policy and strategy issues, etc. Policy and strategy concerns in transport are wide and cover safety, efficiency, economic development, infrastructure, environment, energy, land-use, equity and access. Papers are expected to have clear policy and strategy relevance, to analyze/evaluate transport policies and strategies using up-to-date research methods (both quantitative and qualitative). Papers are also welcomed which focus on understanding the nature and influences affecting policy and strategy change, including technical, attitudinal, institutional, structural and political constraints, including those which provide a comparative analysis. Papers focusing only on methodological development without clear policy focus and relevance will NOT be considered. However, we welcome qualitative policy papers that build on the body of literature, and show clear contributions over and above what exist in the literature, and/or widely applicable to other jurisdictions. (Qualitative papers will NOT be considered if the author(s) advocate certain policy positions without presenting a rigorous framework of analysis.) Papers that focus entirely on individual case studies are more appropriate for our sister journal Case Studies in Transport Policy.AUDIENCE: Local, national and international government agencies and their advisers, responsible for transport policy implementation; academics and researchers involved in teaching and analysis; managers and analysts in the transport industries responsible for strategy formulation and evaluation; activists in the voluntary sector, charities and campaigning groups; students of transport studies, economics, business studies, engineering, geography, planning, sociology and environmental studies
  • Artificial Intelligence for Transportation

    • ISSN: 3050-8606
    Artificial Intelligence for Transportation is a peer-reviewed journal dedicated to advancing the integration of machine learning (ML) and artificial intelligence (AI) into the field of transportation. The journal focuses on innovative research that leverages AI and ML to address critical challenges in understanding, designing, planning, operating, and managing sustainable, safe, and efficient multimodal transportation systems.Emphasizing the development of AI-empowered solutions, the journal seeks contributions that enhance transportation system performance in terms of safety, efficiency, reliability, equity, accessibility, and environmental sustainability. Interdisciplinary research is highly encouraged, particularly work that integrates cutting-edge AI technologies, such as deep learning, reinforcement learning, large language models, with conventional methodologies, e.g. operations research, probabilistic modeling, etc., to tackle complex transportation challenges.Artificia... Intelligence for Transportation strongly supports open science initiatives, promoting the publication of reproducible research and the sharing of large-scale datasets through online repositories. The journal places special emphasis on studies demonstrating the scalability and transferability of AI-empowered solutions across diverse transportation contexts and geographies.
  • Journal of Adolescent Health

    • ISSN: 1054-139X
    Official Publication of the Society for Adolescent Health and Medicine SAHM members can access full-text articles on JAH OnlineThe Journal of Adolescent Health is a multidisciplinary scientific Journal dedicated to improving the health and well-being of adolescents and young adults. The Journal publishes new research findings in the field of Adolescent and Young Adult Health and Medicine ranging from the basic biological and behavioral sciences to public health and policy. We seek original manuscripts, brief reports, review articles, clinical case reports, letters to the editor, and commentaries from our colleagues in Anthropology, Education, Ethics, Global Health, Health Services Research, Law, Medicine, Mental and Behavorial Health, Nursing, Nutrition, Psychology, Public Health and Policy, Social Work, Sociology, Youth Development, and other disciplines that work with or are committed to improving the health and well-being of adolescents and young adults. In addition we seek poetry, personal narratives, images, and other creative works from young people, family and community members, and health professionals that deepen our insights into the lived experiences of adolescents and young adults in a way that can augment scientific peer-reviewed research.The Journal is the official publication of the Society for Adolescent Health and Medicine (SAHM), a multidisciplinary organization committed to improving the health and well-being of adolescents and young adults. One of the Society's primary goals is the development, synthesis, and dissemination of scientific and scholarly knowledge unique to the health needs of young people. To meet this goal, the Society established The Journal of Adolescent Health in 1980.