Journals in Social sciences and humanities
Journals in Social sciences and humanities
Transport Policy
The official journal of the World Conference on Transport Research Society (WCTRS)Transport Policy is an international refereed journal aimed at improving quality of transport policy and strategy analysis, designing and sharing innovative policy and management practices, and application bridging the gap between theory and practice in transport. Its subject areas reflect the concerns of policymakers in government, management strategists in industry, and the public at large, providing independent, original and rigorous analysis to understand how policy and strategy decisions have been made, monitor their effects, and suggest how they may be improved.Transport Policy covers the entire transport sector including all modes: air, maritime, urban, intercity, domestic and international transport economics, policy and strategy issues, etc. Policy and strategy concerns in transport are wide and cover safety, efficiency, economic development, infrastructure, environment, energy, land-use, equity and access. Papers are expected to have clear policy and strategy relevance, to analyze/evaluate transport policies and strategies using up-to-date research methods (both quantitative and qualitative). Papers are also welcomed which focus on understanding the nature and influences affecting policy and strategy change, including technical, attitudinal, institutional, structural and political constraints, including those which provide a comparative analysis. Papers focusing only on methodological development without clear policy focus and relevance will NOT be considered. However, we welcome qualitative policy papers that build on the body of literature, and show clear contributions over and above what exist in the literature, and/or widely applicable to other jurisdictions. (Qualitative papers will NOT be considered if the author(s) advocate certain policy positions without presenting a rigorous framework of analysis.) Papers that focus entirely on individual case studies are more appropriate for our sister journal Case Studies in Transport Policy.AUDIENCE: Local, national and international government agencies and their advisers, responsible for transport policy implementation; academics and researchers involved in teaching and analysis; managers and analysts in the transport industries responsible for strategy formulation and evaluation; activists in the voluntary sector, charities and campaigning groups; students of transport studies, economics, business studies, engineering, geography, planning, sociology and environmental studies- ISSN: 0967-070X

Personality and Individual Differences
The Official Journal of the International Society for the Study of Individual Differences (ISSID)Personality and Individual Differences is primarily devoted to the publication of articles (experimental, correlational, theoretical, expository/review) which enhance our understanding of the structure of personality and other forms of individual differences, the processes which cause these individual differences to emerge, and their practical applications. Accessible methodological contributions are also welcome. The Editors invite papers that focus on the genetic, biological, and environmental foundations of individual differences, and possible interaction effects. While we recognize the importance of questionnaires for the measurement of individual differences, we encourage their link to experimental and behavioural measures. Ultimately the editors of PAID view human beings as bio-social organisms and that work on individual differences can be most fruitfully pursued by attending to both these aspects of our nature.We consider studies involving cross-sectional mediation/moderation analyses of self-reported data only when these directly test a theory.- ISSN: 0191-8869

Automatica
A journal of IFAC, the International Federation of Automatic Control, Automatica is a leading archival publication in the field of systems and control. The field today encompasses a broad set of areas and topics, and is thriving not only within itself but also in terms of its impact on other fields, such as communications, computers, biology, energy and economics. After being founded in 1963, Automatica became a journal of the IFAC in 1969. Since its inception, Automatica has kept abreast with the evolution of the field over the years, and has emerged as a leading publication driving the trends in the field.Automatica features a characteristic blend of theoretical and applied papers of archival, lasting value, reporting cutting edge research results by authors across the globe. It features articles in distinct categories, including regular, brief and survey papers, technical communiqués, correspondence items, as well as reviews on published books of interest to the readership. It occasionally publishes special issues on emerging new topics or established mature topics of interest to a broad audience.Automatica solicits original high-quality contributions in all the categories listed above, and in all areas of systems and control interpreted in a broad sense and evolving constantly.- ISSN: 0005-1098

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2825

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 1742-2876

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2817

Journal of Financial Markets
The Journal of Financial Markets publishes high quality original research on applied and theoretical issues related to securities trading and pricing. Area of coverage includes the analysis and design of trading mechanisms, optimal order placement strategies, the role of information in securities markets, financial intermediation as it relates to securities investments - for example, the structure of brokerage and mutual fund industries, and analyses of short and long run horizon price behaviour. The journal strives to maintain a balance between theoretical and empirical work, and aims to provide prompt and constructive reviews to paper submitters.- ISSN: 1386-4181

Journal of Stored Products Research
The Journal of Stored Products Research provides an international medium for the publication of both reviews and original results from laboratory and field research on all aspects of the preservation and safety of stored products along the supply chain starting from production to the consumer. The scope covers both durable commodities, and fresh fruits, vegetables, and freshly manufactured foodstuffs. Durable commodities are characterized by having relatively low moisture content and include raw and semi-processed foods such as grains, dried fruits, and animal feed, and other stored products such as timber, rubber, resins, clothing, and museum artefacts that are generally suitable for long-term storage. Fresh fruits, vegetables, and freshly manufactured foodstuffs (eg. bakery, sausages), are characterized by having high moisture contents but are stored over short to medium-term storage.Manuscripts are welcomed on: the biology, ecology, physiology, behaviour, taxonomy, and genetics of vertebrates (eg. rodents and birds) and invertebrate pests (eg. insects, mites) and microbial spoilage agents (eg. fungi, mold, yeast, and bacteria)environment... factors influencing the life cycles of the above-listed storage pests and spoilage agentsthe physical, chemical, and biological control of pests and spoilage agents, including the use of biologically producing compounds as preservatives with broad-spectrum antimicrobial activitiessubmission of manuscripts containing research on plant materials/botanicals are encouraged only if significant applied aspects are undertaken demonstrating their detailed chemical composition and long-term efficacy in the laboratory, supported by field application and the use of suitable controls: both negative/blank and positive (i.e., a compound of known activity)development of biochemical or behavioural resistance in pests to control measures and their managementstorage biotechnology, integrated pest management, and decision support systemsthe effects of physical, chemical, and environmental control procedures on the physical and chemical nature, besides quality parameters of the stored commoditiesthe assessment, prevention, and control of physical losses and preservation of quality of commodities during storage, and waste managementregulatory... technological, and socio-economic subjects relevant to stored productsNovel approaches in postharvest food engineering and manufacturing technologies, (eg. AI tools, chemical sensors, gas detectors) in processing, packaging, and design and modifications of storage structuresThe Journal of Stored Products Research reflects the worldwide interest in finding researched-based solutions for problems arising from the process of storage directly affecting the quality of stored products and their relevance to food security and safety, commodity protection, and their market access and trade.- ISSN: 0022-474X

Emerging Markets Review
The intent of the editors is to consolidate Emerging Markets Review as the premier vehicle for publishing high impact empirical and theoretical studies in emerging markets finance. Preference will be given to comparative studies that take global and regional perspectives, detailed single country studies that address critical policy issues and have significant global and regional implications, and papers that address the interactions of national and international financial architecture. We especially welcome papers that take institutional as well as financial perspectives.Publish... papers are expected to include a discussion of next steps and possible extensions for further research in the conclusion section.- ISSN: 1566-0141

The Leadership Quarterly
An International Journal of Political, Social and Behavioral ScienceThe Leadership Quarterly is a social-science journal dedicated to advancing our understanding of leadership as a phenomenon, how to study it, as well as its practical implications.The journal seeks contributions from various disciplinary perspectives, including psychology broadly defined (i.e., industrial-organizat... social, evolutionary, biological, differential), management (i.e., organizational behavior, strategy, organizational theory), political science, sociology, economics (i.e., personnel, behavioral, labor), anthropology, history, and methodology. Equally desirable are contributions from multidisciplinary perspectives.The aim of the journal is to publish scholarly research, theory, and developmental application from diverse fields of inquiry about leadership. The journal will consider studies of leaders from all walks of social life, including formal or informal leaders of any type of group or organization; non-human leadership will also be considered.- ISSN: 1048-9843
