Calls for papers

 

International Journal of Emergency Management
International Journal of Emergency Management

 

Special Issue on: “Information Technology in Emergency Management Systems”


Guest Editors:
Professor Sang M. Lee and Professor David L. Olson, University of Nebraska, USA


The 21st Century has seen significant attention given to low frequency, high impact incidents. There are many tools available to aid the global society to prepare and respond to such incidents, ranging from natural disasters, terrorist events and attacks on financial systems. These tools include database systems, data mining, detection technology, and information security.

The aim of this special issue of IJEM is to share research related to the use of information and systems technology of all kinds in support of any aspect of emergency management.

The objectives are to:

  • Study societal systems with respect to vulnerabilities
  • Examine the complexity and adaptability of these systems
  • Examine the potential of information technology (in a broad sense) to aid in preparing, preventing, detecting, and responding high impact incidents (natural or human-induced)
  • Consider ethical implications of the use of such technology
  • Create a forum for debate of critical related issues

The focus is on information technology (computer architecture, database support, analysis to include data mining, decision support to include recognition primed decision making) to improve security of societal systems.

Papers reporting research on the use or potential of information technology, systems views, decision support, and related tools to aid in preparedness, prevention, detection, and response to incidents are invited.

Subject Coverage
Suitable topics include, but are not limited to:
  • Information technology architecture
  • Database impact on society
  • Data mining
  • Rapid response decision making (recognition-primed decision making and related methods)
  • Complex adaptive systems
  • System (medical, communication, transportation, etc.) vulnerability analysis

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere

All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Papers Submission section under Author Guidelines

To submit a paper, please go to Submission of Papers

This is our preferred route for submitting papers; please use it if at all possible. However, if you experience any problems submitting papers in this way, an alternative route is suggested below


Important Dates

Submission of papers: 2 January 2006

Initial screening of selecting papers; authors begin revisions: 1 March 2006

Final paper selection: 1 May 2006