About the Journal
Focus and Scope
The Journal of Integrated Security and Safety Science (JISSS) publishes innovative papers that offer a significant contribution – conceptual, theoretical, methodological, or empirical – to all areas of physical security and safety in industries and infrastructures. The primary focus of the journal is on the broad spectrum of security areas, such as terrorism, piracy, theft (e.g. of chemical products), and sabotage. Contributions addressing the broad safety spectrum are also welcomed, as long as a link with security is established. This link can for instance be a component of the methodology and/or results, or this link can be explored in the discussion to facilitate the contribution’s connection to the security and safety field. Contributions could elaborate on possible conflicts between safety and security, and how such conflicts can be managed, or how both domains can complement each other.
Of particular interest are articles that combine science, technology, management strategies and regulations to invent scientifically substantiated yet practical solutions for securing and safeguarding assets in various domains including: the chemical and process industry, oil and gas industry, transportation systems including HAZMAT transportation, power plants (nuclear, LNG, etc.), pipelines, drinking water and water treatment systems, commercial facilities, and government facilities.
The scope of the journal includes, but is not limited to:
- Security and safety concepts, models and theories
- Methods and frameworks for integrating security and safety
- All-hazard approach in emergency management and decision-making
- Security and safety behaviours, perceptions and communication
- New emerging security and safety issues and technologies (e.g. Artificial Intelligence)
- Data driven applications for (integrating) security and safety
- Security and safety culture/climate
- Reliability, vulnerability and resilience related to (integrating) security and safety
- Public and societal security and safety related to hazardous industries and critical infrastructures
- Security and safety risk assessment and management in hazardous industries and critical infrastructures
- Innovative approaches for threat likelihood assessment
- Attractiveness analysis
- Cyber security of operation technologies
- Vulnerability assessment under intentional events
- Consequence analysis with an emphasis on cascading effects in interdependent and adjacent infrastructures
- Security-informed and safety-informed decision making and design
- Privacy issues and concerns linked to security and safety
- Optimization of security and safety risk management strategies
- Case studies on security and safety issues
Submissions related to both fundamental questions (concepts, theories, methods) and/or applied problems (problem domains and empirical results) are within the scope of the journal.
The journal accepts contributions in the form of original research papers, review articles, industrial case studies, security and safety recommendations, book reviews, and short communications. Opinion and discussion papers are also encouraged. Registered Reports (prior to data collection) can also be submitted (more information: https://cos.io/rr/).
Open Access Policy
JISSS is licensed under a Creative Commons Attribution 4.0 International (CC BY 4.0) licence. The license means that anyone is free to share (to copy, distribute, and transmit the work), to remix (to adapt the work) under the following conditions:
- The original authors must be given credit
- For any reuse or distribution, it must be made clear to others what the license terms of this work are
- Any of these conditions can be waived if the copyright holders give permission
- Nothing in this license impairs or restricts the author's moral rights
This journal utilizes the LOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration. More...
JISSS grants you the right to publish the metadata of the series, issues and articles under the terms of the Creative Commons CC0 1.0 Universal (CC0 1.0).
Editors, authors and publisher adopt the guidelines developed by the Committee on Publication Ethics (COPE).
Any submitted manuscripts will briefly be reviewed by the journal Editor-in-Chief (EIC) to ensure the compliance with the journal criteria in terms of domain relevance, basic science, and format standards. The manuscripts accepted for peer-review will then be assigned to an Associate Editor (AE), a member of the editorial board with the closest research area as to the topic of the manuscript. The AE will send the paper to at least two reviewers who are an expert in the domain. The reviewers are supposed to provide the AE with their comments in no more than six weeks. In special cases, the AE can ask for the opinion of an additional reviewer.
Reviewers will always be selected from a different university than the affiliations of the authors of the submitted manuscript. Although the authors can suggest their desired reviewers, it is up to the AE whether to send the manuscript to the suggested reviewers. The review process is double-blinded.
(previous ISSN 2468-4546 Journal of Integrated Security Science)