Journals in Social sciences
Journals in Social sciences
The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.
Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.
The International Journal of Management Education
The International Journal of Management Education provides a forum for scholarly reporting and discussion of developments in all aspects of teaching and learning in business and management. The Journal seeks reflective papers which bring together pedagogy and theories of management learning; descriptions of innovative teaching which include critical reflection on implementation and outcomes will also be considered.The editors particularly welcome submissions on: • Critical perspectives on education and its institutional development in all the business and management disciplines; • Changes in the structure of business and management education and the changing roles of management educators; • Relationships of business and management programmes to employers' needs; • Globalisation of business and responsible management education in advancing the United Nations Sustainable Development Goals.By promoting critical discussion on current innovations within these areas, the journal represents an excellent forum for highlighting the profile of management education on both a national and international level.The International Journal of Management Education is the outlet for educational research and developments within business, management, accountancy and finance.Professor Neil Marriott Deputy Vice Chancellor Dean, Faculty of Business, Law and Sport Director, Winchester Business School- ISSN: 1472-8117

Information & Management
The International Journal of Information Systems Theories and ApplicationsInformat... & Management serves researchers in the information systems field and managers, professionals, administrators and senior executives of organizations which design, implement and manage Information Systems Applications. The major aims are:• To collect and disseminate information on new and advanced developments in the field of information systems;• To provide material for training and education in information systems;• To encourage further progress in information systems methodology and applications;• To cover the range of information system development and usage in their use of managerial policies, strategies, and activities for business, public administration, and international organizations.- ISSN: 0378-7206

Resources Policy
The International Journal of Minerals Policy and EconomicsResources Policy is an international journal devoted to the economics and policy issues related to mineral and fossil fuel extraction, production and use. The journal content is aimed at individuals in academia, government, and industry. Submissions of original research are invited that analyze issues of public policy, economics, social science, geography and finance in the areas of mining, non-fuel minerals, energy minerals, fossil fuels and metals.Examples of topics covered in the broad discipline of mineral economics include mineral market and price analysis, project evaluation, mining and sustainable development, mineral resource rents and the resource curse, mineral wealth and corruption, mineral taxation and regulation, strategic minerals and their supply, and the impact of mineral development on local communities and/or indigenous populations.Submissi... are also invited on related natural resource topics of interest and importance to the minerals and fossil fuel community, such as sustainability, topics from environmental economics related to mineral production and use, and socio-economic impacts of mineral production and use.The journal DOES NOT publish papers whose primary focus is on agriculture, forestry or fisheries.We aim to publish robust scientific work, so methods should be carefully described and data properly cited. Literature reviews are accepted as long as they provide meaningful insights and a clear contribution to the literature. Case studies are also accepted as long as they contribute to the debate and comprehension of issues of broader significance. Discussion and debate-focused articles without a significant research component are generally not accepted, but they could be considered at the discretion of the Editors.Original research articles (generally 6,000–10,000 words, including references) published in Resources Policy are expected to make a clear and original scholarly contribution to debates in mineral economics, natural resource governance, and resource-related public policy. Such articles should be structured around a clearly articulated research question or analytical puzzle and demonstrate methodological transparency and rigour, whether drawing on qualitative interviews, document and policy analysis, case studies, or quantitative data. Contributions may advance or refine conceptual or theoretical frameworks, introduce new empirical insights, or offer systematic comparative analysis, but they should move beyond descriptive accounts to provide analytically grounded and policy-relevant findings.Perspective... (generally 4,000–6,000 words, including references) offer shorter, more interpretive contributions that engage directly with contemporary issues shaping resource policy and mineral governance. These papers are intended to be agenda-setting rather than exhaustive, and may critically examine emerging concepts, dominant narratives, policy shifts, geopolitical developments, or market disruptions relevant to the resources sector. While Perspectives are afforded greater flexibility in scope, method, and tone than full research articles, arguments should remain analytically grounded, clearly structured, and situated within relevant literatures, with the aim of stimulating informed debate among scholars, policymakers, and practitioners.- ISSN: 0301-4207

Computer Law & Security Review
The Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. It has been published six times a year since 1985 under its founding Editor, Emeritus Professor Steve Saxby, who retired in 2018 after handing editorship over to Professor Sophie Stalla-Bourdillon. It is the leading journal of its kind in Europe and provides a robust peer reviewed medium and policy forum for dissemination of knowledge and discussion, supported by powerful Editorial and Professional Boards.CLSR is accessible to a wide range of academics, researchers, research institutes, companies, libraries and governmental and non-governmental organisations in both the public and private sectors as well as professionals in the legal, IT and related business sectors in more than 100 countries. It is available on ScienceDirect, the world's foremost provider of electronic scientific information to more than 16 million subscribers.CLSR authors come from leading academics, international specialists, legal professionals and early career researchers from many of the most renowned research centres and universities in the world. Contributors are also located in the major international law firms, specializing in technology law, who provide essential comment and analysis built upon widespread experience of applying IT law in practice. CLSR further welcomes policy analysis from legal specialists, the judiciary, professional and business organisations operating in IT and from those with regulatory responsibilities for information and communications technology from both the public and private sectors as it regularly contributes to consultations undertaken by the EU, Council of Europe and other bodies. Papers that reflect the outcomes of funded research e.g. from Research Councils or EU projects are welcomed. Submissions are welcomed from any part of the world. CLSR is looking for papers within the subject area that display good quality legal analysis, new lines of legal thought or policy development that go beyond mere description of Law or policy, however accurate that may be.CLSR publishes refereed academic and practitioner papers on a wide range of legal topics such as Internet law, telecoms regulation, intellectual property, cyber-crime, surveillance and security, e-commerce, outsourcing, data protection, ePrivacy, EU and public sector ICT policy, and many others. In addition it provides a regular update on European Union developments, and national news from more than 20 jurisdictions in both Europe and the Pacific Rim.All papers are then peer reviewed by relevant experts and feedback is given whether or not a paper is accepted or returned for further work. Submissions will normally be between 6,000-15,000 words although papers of a higher word length may also be submitted subject to negotiation with the Editor. The Editor's policy is to try and accommodate contributions of all sizes above the minimum threshold where length is dictated by the needs of the subject matter.Opinion pieces concerning policy, legislation or case law of a minimum of 2000 words and upwards will also be considered but these will appear as comment and not as feature articles.Please note that CLSR strongly encourages PhD students, who have not yet obtained their degree, not to submit papers unless accompanied by confirmation that the supervisor has seen the manuscript and is recommending it for publication. If the supervisor's approval can be provided, asserting that the draft manuscript has been reworked and developed with the journal's aims and expectations in mind, then it will be accepted for review.- ISSN: 0267-3649

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2825

Research in Autism
Research in Autism (REIA) publishes high quality empirical articles and reviews that contribute to a better understanding of Autism Spectrum Disorders (ASD) at all levels of description; genetic, neurobiological, cognitive, and behavioral. The primary focus of the journal is to bridge the gap between basic research at these levels, and the practical questions and difficulties that are faced by autistic individuals and their families, as well as carers, educators and clinicians. In addition, the journal encourages submissions on topics that remain under-researched in the field. We know shamefully little about the causes and consequences of the significant language and general intellectual impairments that are very common among the autism community. Even less is known about the challenges that autistic women face and less still about the needs of autistic individuals as they grow older. Medical and psychological co-morbidities and the complications they bring with them for the diagnosis and treatment of ASD represents another area of relatively little research. REIA is committed to promoting high-quality and rigorous research on all of these issues.- ISSN: 1750-9467

Slavic Literatures
Slavic Literatures is a peer-reviewed academic periodical that publishes literary studies in English and in Russian. The journal combines special and regular issues devoted to Slavic literatures. Many journal contributions are devoted to Russian literature, but we also regularly publish and emphatically welcome research devoted to Belarusian, Bosnian, Croatian, Czech, Serbian, Slovak, Slovenian, Polish, Ukrainian, and other Slavic literatures.Publishe... since 1971, the journal has served as publication outlet for cardinal names in Slavic literary and cultural studies. The journal today continues to refine and broaden the field, by uniting English- and Russian-language scholarship from Central, Eastern, and Western Europe, the US, Asia, and Australia; by combining the work of talented newcomers with that of leading academics; and by welcoming methodological and disciplinary innovation. All methods and viewpoints are welcomed, provided they contribute new, original or challenging insights to the field, or use insights from young research paradigms to complicate existing thinking in Slavic literary studies.- ISSN: 0304-3479

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2817

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 1742-2876

Urban Forestry & Urban Greening
Urban Forestry and Urban Greening is a refereed, international journal aimed at presenting high-quality research with urban and peri-urban woody and non-woody vegetation and its use, planning, design, establishment and management as its main topics. Urban Forestry and Urban Greening concentrates on all tree-dominated (as joint together in urban forests) as well as other green resources in and around urban areas, such as woodlands, public and private urban parks and gardens, urban nature areas, street tree and square plantations, botanical gardens and cemeteries, building envelop greening, etc.The journal welcomes basic and applied research papers, as well as review papers and short communications. Contributions should focus on one or more of the following aspects:Form, functions, and ecosystem services of urban forests and other vegetation, including aspects of urban environmental science and urban ecology.Policy-makin... planning and design related to urban forests and other vegetation.Selection and establishment of tree resources and other vegetation for urban environments.Managem... of urban forests and other vegetation.The ecosystem services urban vegetation provides.Original contributions of a high academic standard are invited from a wide range of disciplines and fields, including forestry, biology, horticulture, arboriculture, landscape ecology, pathology, soil science, hydrology, landscape architecture, landscape planning, urban planning and design, environmental/ecolog... economics, environmental sociology, environmental psychology, public health, and education.Special attention will be given to interdisciplinary research as developed under the approaches of, for example, urban forestry, arboriculture, urban greening, urban ecology, urban health, urban agriculture, urban horticulture, urban silviculture, and community forestry.For field research or descriptive studies, a robust dataset made of multiple dates of measurement conducted over different growing seasons is required for publication. For research conducted under controlled conditions or research conducted using a mechanistic approach, multiple sampling dates are still required, although monitoring can be conducted over shorter time periods.- ISSN: 1618-8667
