Journals in Social sciences and humanities
Journals in Social sciences and humanities
Archives of Gerontology and Geriatrics
Archives of Gerontology and Geriatrics is an international journal integrating experimental, clinical and social studies on aging. The journal provides a medium for the publication of papers from the fields of experimental gerontology and clinical and social geriatrics. The principal aim of the journal is to facilitate the exchange of information between specialists in these three fields of gerontological research. Experimental papers dealing with the basic mechanisms of aging at molecular, cellular, tissue or organ levels will be published.Clinical papers will be accepted if they provide sufficiently new information or are of fundamental importance for the knowledge of human aging. Purely descriptive clinical papers will be accepted only if the results permit further interpretation. Papers dealing with anti-aging pharmacological preparations in humans are welcome. Papers on the social aspects of geriatrics will be accepted if they are of general interest regarding the epidemiology of aging and the efficiency and working methods of the social organizations for the health care of the elderly.- ISSN: 0167-4943

Educational Research Review
The Journal of the European Association for Research on Learning and Instruction (EARLI)Educational Research Review is an international journal addressed to researchers and various agencies interested in the review and meta-analysis of studies in education at any level. The journal accepts high quality articles that are solving educational research problems by using a review approach. This may include thematic or methodological reviews, or meta-analyses. The journal does not limit its scope to any age range. The journal invites articles on the broad range of settings in which people learn and are educated (school settings, corporate training, formal or informal settings, etc.).Empirical studies or theoretical contributions that do not include a critical review analysis are not accepted.- ISSN: 1747-938X

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 1742-2876

Transportation Research Part C: Emerging Technologies
The focus of Transportation Research: Part C (TR_C) is high-quality, scholarly research that addresses development, applications, and implications, in the field of transportation systems and emerging technologies . The interest is not in the individual technologies per se, but in their ultimate implications for the planning, design, operation, control, maintenance and rehabilitation of transportation systems, services and components. In other words, the intellectual core of the journal is on the transportation side, not on the technology side. The integration of quantitative methods from fields such as operations research, control systems, complex networks, computer science, artificial intelligence are encouraged.Of particular interest are the impacts of emerging technologies on transportation system performance, in terms of monitoring, efficiency, safety, reliability, resource consumption and the environment. Submissions in the following areas of transportation are welcome: multimodal and intermodal transportation; on-demand transport; intelligent transportation systems; traffic and demand management; real-time operations; connected and autonomous vehicles; logistics; railways; resource and infrastructure management; aviation; pedestrians and soft modes.Special emphasis is given in open science initiatives and promoting the opening of large-scale datasets for papers published in TR_C that can support transferability and benchmarking of different approaches. The realization of data opportunities that arise from emerging technologies and new sensors in transportation can revolutionize how this data reshape our understanding of congestion mechanisms and can contribute in efficient and sustainable mobility management.- ISSN: 0968-090X

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2825

Technological Forecasting and Social Change
A major forum for those wishing to deal directly with the methodology and practice of technological forecasting and future studies as planning tools as they interrelate social, environmental and technological factors.Please see our SI Guideline for information on submitting a Special Issue proposal.MISSIONTFSC invites submissions that focus on technology and its impact on society. Technology provides opportunities for growth and innovation by offering the means for introducing novel or improved products, services, and processes that have the potential to provide additional value to societal actors. TFSC is committed to publishing research with a clear technological focus that significantly contributes to both theory and practice. Technological innovation can optimize existing business activities, extend into new business areas, push the frontiers of markets, and contribute to mitigating and adapting to socioeconomic and environmental challenges. Tapping into the innovation potential of technology and evaluating its impact requires moving across four fields of research: first, forecasting the emergence, development, and impact of technologies; second, taking managerial decisions at the organizational and industrial level to materialize the innovation potential of technologies; third, examining and evaluating the multifaceted effects that the implementation of technological innovations have on society, organizations, and the environment, and fourth, developing appropriate governance processes and frameworks. .THE FOCUS OF TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE: WHAT WE AIM TO PUBLISH AND WHAT WE DO NOT PUBLISHTFSC invites submissions that focus on technology and its impact on society. Technology provides opportunities for growth and innovation by offering the means for introducing novel or improved products, services, and processes that have the potential to provide additional value to societal actors. This technological innovation can be directed at optimizing existing business activities, extending into new business areas, pushing the frontiers of markets, and contributing to mitigating and adopting socioeconomic and environmental challenges.Tapping into the innovation potential of technology and evaluating its impact requires moving across three majorfields of research.First, the future characteristics of technologies need to be forecasted. This implies observing and analyzing the emergence and development of novel technologies and assessing their potential functioning and impact on society. Technological forecasting is also indispensable to make informed decisions about investing resources, developing new products, planning for policy implications, and strategically positioning technological innovations in a competitive market. Moreover, it is a vital tool that helps organizations adapt to technological change and plan for the future with greater certainty. Manuscripts focused on forecasting the emergence, development, and impact of technologies should be submitted to the Technological Forecasting and Modelling bureau of TFSC. Second, materializing the innovation potential of technologies and ensuring that it becomes instrumental in advancing businesses, economies and societal goals requires managerial decisions. Such managerial decisions for example concern choices between technologies, allocation of resources to technological innovation initiatives, organizational change to enable technological transformation. Here the focus is on research on the management of technologies rather than technologies that support managerial decisions. Research that informs decisions in technology management at the organizational and industrial level should be submitted to the Management of Technology bureau of TFSC. Third, research efforts are needed to examine and evaluate the multifaceted effects of technological advancements on society, organizations, and the environment. This area of study builds on contributions that seek to understand the direct and indirect consequences of technology implementation, ranging from its economic implications to social changes, without forgetting about environmental effects. The ultimate goal is to provide assessments that can inform policymakers, businesses, and the public about the benefits and risks associated with the deployment of technological innovations. This field of research also emphasizes the importance of tracking the impact of technologies over time and across different settings. Moreover, this focus can involve not just assessing the outcomes of technology implementation, but also the processes by which technologies are integrated and adopted. Research in this domain should be submitted to the Impact and Evaluation of Technology bureau of TFSC.Fourth, developing appropriate institutional structures, regulatory frameworks and decision-making processes is essential for ensuring that innovative technologies equitably address societal challenges while managing associated risks. This implies understanding how different approaches can effectively facilitate and guide the diffusion and deployment of technologies, encompassing studies of regulatory innovation, policy experimentation, and governance models that can adapt to rapidly evolving technologies. It asks how different stakeholders - including government bodies, technical experts, industry players, civil society organizations, and the public - can be effectively engaged in technology governance processes. Manuscripts focused on understanding how governance of emerging technologies can foster sociotechnical progress while protecting public interests should be submitted to the Technology Governance and Public Policy bureau of TFSC.During the submission process, authors are responsible for carefully selecting the bureau in which their study should be assessed for potential publication in TFSC. We also encourage submissions taking a more holistic approach to the study of technology and its impact on society, by covering thematic areas that are relevant for more than one bureau. It is also important to highlight that manuscripts looking into individual, organizational, or societal factors that impact technological development are out of scope. Moreover, TFSC does not publish research that focuses on social change only, unless authors examine this change through the lens of specific technological developments. All manuscripts published in TFSC are expected to make substantial theoretical and practical contributions. Practical contributions can be translated into recommendations for management practice but also as policy implications. These contributions need to be explicitly spelled out and well-rooted in the findings of your study. To substantially advance our understanding of technology and its impact on society, submissions have to be rooted inan effective, consistent, and current theoretical basis. An effective theoretical underpinning enables researchers to frame the subject matter under investigation. For a theory base to be consistent, all ideas developed in the manuscript need to build on a theoretical framework with matching ontological and epistemological basic assumptions. The theoretical underpinning is current if authors effectively leverage state-of-the-art knowledge provided in scientific publications. TFSC will not publish manuscripts that lack a strong theoretical contribution, methodological development, and practical implications. TFSC also desk reject papers that violate submission or ethical guidelines as outlined in the guide for authors on the journal webpage.- ISSN: 0040-1625

Journal of Criminal Justice
The Journal of Criminal Justice is an international journal intended to fill the present need for the dissemination of new information, ideas and methods, to both practitioners and academicians in the criminal justice area. The Journal is concerned with all aspects of the criminal justice system in terms of their relationships to each other. Although materials are presented relating to crime and the individual elements of the criminal justice system, the emphasis of the Journal is to tie together the functioning of these elements and to illustrate the effects of their interactions. Articles that reflect the application of new disciplines or analytical methodologies to the problems of criminal justice are of special interest.Since the purpose of the Journal is to provide a forum for the dissemination of new ideas, new information, and the application of new methods to the problems and functions of the criminal justice system, the Journal emphasizes innovation and creative thought of the highest quality.- ISSN: 0047-2352

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2817

Energy Policy
The International Journal of the Political, Economic, Planning, Environmental and Social Aspects of EnergyEnergy Policy is an international peer-reviewed journal addressing the policy implications of energy supply and use from their economic, social, planning and environmental aspects. Papers may cover global, regional, national, or even local topics that are of wider policy significance, and of interest to international agencies, governments, public and private sector entities, local communities and non-governmental organisations. Within this broad spectrum, topics of particular interest include energy and environmental regulation, energy supply security, the quality and efficiency of energy services, the effectiveness of market-based approaches and/or governmental interventions, technological innovation and diffusion, and voluntary initiatives where the broader policy implications can be recognised. Policy prescriptions are required to be supported by rigorous analysis and balanced appraisal.Given the aims and scope of Energy Policy, all submitted papers should explicitly address policy issues involving energy supply or use.This journal welcomes contributions that support and advance the UN's sustainable development goals, in particular SDG 7 (Affordable and clean energy).Special issue proposals Prospective guest editor(s) should submit written proposals that incorporate the rationale for the special issue topic, positions it in the literature, and include some illustrative topics and proposed contributors. Guest Editors should complete and submit this Special Issue Proposal template to be considered for publication in the Journal.- ISSN: 0301-4215

Library & Information Science Research
Library & Information Science Research, a cross-disciplinary and refereed journal, focuses on the research process in library and information science, especially demonstrations of innovative methods and theoretical frameworks or unusual extensions or applications of well-known methods and tools. Library & Information Science Research publishes research articles primarily from a social science perspective.LISR does not normally publish technical information science studies (e.g., algorithmic methods related to information retrieval or natural language processing) or most bibliometric studies, as these would find greater readership in the many fine journals covering these areas.- ISSN: 0740-8188
