NCTN Online Publications Guidelines:
The NCTN presents authoritative information on the latest developments and on current issues, in an accessible style that appeals to researchers and working professionals alike.
The website online publications bring new perspective to the theory and practice of security management, with evaluations of the latest innovations in security technology, and insight on new practices and initiatives. Among the topics covered are new security management techniques, as well as news, analysis and advice regarding current research and op-end articles.
The website online publications cover specific types of geopolitical issues such as political violence and terrorism, national security, cyber terrorism, terrorist financing, religious radicalization and violent extremism, organized crime with the nexus of terrorism and hybrid terrorism linked to known state and rogue states.
Specialized settings are also discussed, including nuclear safety, aviation, rail transport, maritime piracy, crime in public spaces and events and more. As technology expands, the journal devotes coverage to computer and information security, cybercrime, and data analysis in investigation, prediction and threat assessment. Management topics covered include evaluation of security measures, anti-crime design and planning, staffing, and regulation of the security industry.
The content of the pages of this website is for your general information and use only. It is subject to change without notice.
Neither we nor any third parties provide any warranty or guarantee as to the accuracy, timeliness, performance, completeness or suitability of the information and materials found or offered on this website for any particular purpose. You acknowledge that such information and materials may contain inaccuracies or errors and we expressly exclude liability for any such inaccuracies or errors to the fullest extent permitted by law.
Your use of any information or materials on this website is entirely at your own risk, for which we shall not be liable. It shall be your own responsibility to ensure that any products, services or information available through this website meet your specific requirements.
This website contains material which is owned by or licensed to us. This material includes, but is not limited to, the design, layout, look, appearance and graphics. Reproduction is prohibited other than in accordance with the copyright notice, which forms part of these terms and conditions.
All trademarks reproduced in this website, which are not the property of, or licensed to the operator, are acknowledged on the website.
Unauthorized use of this website may give to a claim for damages and/or be a criminal offence.
From time to time this website may also include links to other websites. These links are provided for your convenience to provide further information. They do not signify that we endorse the website(s). We have no responsibility for the content of the linked website(s).
You may not create a link to this website from another website or document without Academic Conferences and Publishing Internationals’ prior written consent.
Your use of this website and any dispute arising out of such use of the website is subject to the laws of Finland and the European Union.
Editor in Chief: Andrin Raj, email: firstname.lastname@example.org
Advisor: Jere Peltonen, email: email@example.com
This portal is structured to invite all intellectual works encompassing security studies in the widest sense. The primary requirement for an article to be published on this portal is original, logical, empirical, relevant and theoretically sound analysis. However, innovation remains the central aim of this endeavor. Security studies portal welcomes perspectives from all corners of the world and encourages perspectives from the developing as well as developed world.
- POLITICAL VIOLENCE AND TERRORISM
- RELIGIOUS TERRORISM
- PREVENTION OF VIOLENT EXTREMISM
- MAN MADE DISASTER
- CHEMICAL, BIOLOGICAL, RADIOACTIVE, NUCLEAR EXPLOSIVES (CBRE)
- NATURAL TECHNOLOGICAL (NATECH)
- CONFIDENCE AND SECURITY BUILDING MEASURES
- CONFLICT PREVENTION/REHABILITATION
- DIVERSITY AND NATIONAL SECURITY
- HUMAN TRAFFICKING
- INTERNATIONAL ORGANIZATIONS AND THEIR ROLE IN GLOBAL SECURITY
- MILITARY ASPECTS OF SECURITY
- NATIONAL, REGIONAL AND GLOBAL SECURITY
- PEACE AND CONFLICT RESOLUTION
- REGIONAL ARRANGEMENTS TO FACILITATE PEACE AND SECURITY
- SECURITY AND COOPERATION IN CONTEMPORARY TIMES
The list of subthemes is exhaustive but by no means limited to the abovementioned topics. The final decision based on criteria of innovation, relevance and broad categorization will be taken by the Editor(s).
Research articles are detailed, original and substantive works in the realm of security studies. Submissions shall be, well-researched first-rate and fully-developed theoretical arguments on an issue related to security studies. The general length of such articles shall be 5,000- 8,000 words (excluding supplementary information, but including footnotes, endnotes, bibliography, and tables) but submissions up to 10,000 words will be considered.
Review articles shall be essays of article-length reviews that make a novel theoretical or empirical point. Review essays range from 3,000-6,000 words (excluding online-only supplementary material) and shall review two or more books as well as related research, with the bulk of the article dedicated to the reviewer’s analysis.
Short essays and commentaries (Insights/OP-END)
Short articles and essays shall be analytical and theoretically based focused on issues of contemporary significance. They shall have a title which is not vague and shall focus on putting out suggestions, opinion and insights for policy makers with logical outcomes expected from those suggestions. They can be sourced and sighted for references. The word limit of such article should be below 2000-4000 words.
Format and styling to be followed:
- In all manuscripts, authors should use a clear, accessible, and engaging writing style. This means favoring short sentences, avoiding unnecessary jargon, and using acronyms sparingly. Abstracts and introductions should include a clear statement of the manuscript’s scope, central argument(s), findings, and wider significance.
- We require accepted articles to conform to the common "International Studies Association Formatting Policies" and the principles of style and presentation discussed there. This includes the following:
- The entire document, including footnotes but excluding figures and tables, should be double-spaced.
- All notes must be footnotes, not endnotes. Except for Insights/Op-End articles for end notes or none. Figures and tables should be placed in-line and as close as possible to the first reference made in the text. Tables must be formatted for legibility and comprehensibility; see, for example, these guidelines.
- Limit the number of citations to the author’s own work. Instead of omitting self-citations or using placeholders such as “author,” authors should write citations to their own work in the third person.
- Citations should use an "author-date" citation style. Manuscripts must have a references section at the end.
- Even when attached to paraphrased material, citations should usually include references to specific pages or locations in a text.
- Following the Chicago Manual of Style, please opt for the traditional American spelling of words that have both European and U.S. spellings (liter/litre, analyze/anaylse, etc.).
- Authors should submit manuscripts directly to the Editors
- Authors should present quantitative data and elucidate statistical models in forms that are accessible to a general audience. All tables, graphs, figures etc. should be on separate pages in the manuscript and be numbered consecutively, accompanied by a title and footnotes where necessary.
- Please be aware that the requirements for online submission and for reproduction in the journal are different: (i) for online submission and peer review, please upload your figures either embedded in the word processing file or separately as low-resolution images (.jpg, .tif, .gif or. eps); (ii) for reproduction in the journal, you will be required after acceptance to supply high-resolution .tif files. Learn more about figure requirements.