SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Journal of Strategic Security (JSS)
Call for Papers
The Strategic Security of Ephemeral Global
Identities
Guest Editor: Matt Armstrong1
Deadline: March 15, 2016
Submit online: http://scholarcommons.usf.edu/jss/
Email questions: editor@henley-putnam.edu
The Journal of Strategic Security (JSS), a publication of Henley-Putnam University,
seeks manuscripts for an upcoming special issue on future trends global identities for
the Summer 2016 issue, Vol. 9, No. 2, featuring our Guest Editor, Matt Armstrong.
Around the globe, burgeoning marketplaces of ideas and loyalties threaten traditional
models of both nationalism and governance. Sometimes erroneously labeled a “war of
ideas,” these marketplaces are empowered by today’s communication and
transportation networks.
Today, the networks that facilitate inexpensive information and human flows are
permitting a new kind of reach and engagement not possible before. Social media, peer-
to-peer communications, websites, encryption technologies, satellite TV, and systems
can provide a rich experience personalized to an individual or group. This can be done
at little to no cost and without the participation or knowledge of societal and
governmental “gatekeepers”—peer groups, institutions, and even family members. On
both sides of the transaction, barriers to group membership are increasingly bypassed or
1 Matt Armstrong is an author, advisor, and lecturer on public diplomacy and international media. He sits
on several boards, including the Public Diplomacy Council and the Broadcasting Board of Governors, and
in 2004, he launched the widely-read public diplomacy blog, www.MountainRunner.us. He is nearly
finished with his first book, a work that examines the original purpose and design of U.S. government
international media and public diplomacy as it began and evolved from 1917 to 1948.
negotiable in the interest of the group. A person no longer needs to be of a certain
ethnicity, from a culture, or speak a language to be virtually transported anywhere to
find a feeling of belonging and acceptance. Increasingly, these conditions remove, or at
least mitigate, pressure to assimilate or conform to local societal, even legal, norms.
What has emerged is a marketplace where people may opt-in, or “test drive,” multiple
identities at once without needing to commit to one. Connections can be made and
maintained online, asynchronously, or in-person. Conversely, a person may opt-out of
an identity. She may be curious or disenfranchised and new identities previously
difficult, if not impossible, to reach are now available. He may want to reestablish a link
to his ancestry or with family that did not migrate. Empathy or political disagreement
offer two of many other possible motivations.
As the marketplace of ideas manifests as a marketplace of loyalty, the impact on
domestic and foreign policies on all kinds of states is real. While expensive shortwave
radio reached across borders and affected the loyalty of untold numbers of listeners, the
transaction costs of today’s marketplace is nearly zero. Virtually anyone can be a
“broadcaster” now and participate in conversations discretely. Barriers to action have
also changed. Individuals and groups have an increasing vote in security affairs, from
contemplating and executing events of disruption and destruction, to leaking secrets, to
recruiting campaigns, to shaping political environments for governments. In other
words, the stakes are greater now.
 What is the meaning of citizenship, loyalty to the state, accountability of a citizen
to the state, and of a state for the actions of its citizens?
 Is the relevancy and impact of nationalism and citizenship understood in this
new marketplace of ideas, identities, and loyalties?
 How does the state react to this marketplace? What do defensive and offensive
measures look like to capture or retain “market share”?
 Does the marketplace work differently in liberal democracies than in illiberal
regimes?
 What is the relationship between identity politics domestically and the
marketplace of loyalties on a transnational scale?
Authors from business, government, and academic sectors are encouraged to submit
their research for this issue of the Journal of Strategic Security. We are especially eager
to receive papers on these and related topics with an international perspective.
The Journal looks forward to reviewing manuscripts beginning on the March 15, 2016
submission deadline.
 Submit papers online at: http://scholarcommons.usf.edu/jss/.
 Please contact: editor@henley-putnam.edu for more information.
 Submission information and links can also be found below.
About the Journal of Strategic Security
The Journal of Strategic Security is a peer-reviewed professional journal published
quarterly by Henley-Putnam University Press. JSS provides a multi-disciplinary forum
for scholarship and discussion of strategic security issues drawing from the fields of
intelligence, terrorism and counterterrorism studies and protection, among others.
The Journal encourages diversity in theoretical foundations, research methods, and
approaches. Quantitative and qualitative studies, for example, each offer valuable
contributions to the field of strategic security. Academic disciplines of anthropology,
criminology, economics, history, international relations, political science, psychology,
and sociology are welcome, as are the applied scholarly fields of security studies,
strategic studies, and intelligence studies.
JSS emphasizes contemporary security issues, so manuscripts focused on non-state
actors are of particular interest. Topics such as counter-terrorism, jihadist ideology,
genocide, global policing, insurgencies, intelligence, inter-state armed conflict, irregular
warfare, radicalization, risk management, terrorism, threat assessment, and violent
extremism are well suited to the Journal, as are contributions on security threats arising
from transnational crime, global climate change, failing states, energy and
environmental security issues, and health crises such as pandemics.
JSS publishes review articles, original empirical research, and analytic/conceptual
works that contribute to a better understanding of security-related threats and ways to
prevent or mitigate their impact. Each article should analyze and include implications
for policy and practice.
Please direct all questions to: editor@henley-putnam.edu.
Who Should Submit?
We welcome submissions from students, practitioners, scholars, and experts from the
intelligence, military, and law enforcement communities, as well as from government,
academia, and the private sector. If you have a proposal for a paper or a completed
manuscript, please submit it for consideration according to the instructions below.
Submission Guidelines:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Articles should be approximately 5,000 words. Occasionally, we print longer pieces (up
to 10,000 words) depending on the context and advanced notification.
Format
All documents should be in Microsoft Word format and submitted though the Journal’s
online manuscript management system: http://scholarcommons.usf.edu/jss/. No
hard copy submissions will be accepted. Submitted articles should be in 11.5 pt. Georgia
font. Please visit our Submission Guidelines for more details:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Annotations
To receive full consideration for publication, all submissions must be carefully
referenced using footnotes that include, if applicable, the URL of online sources.
Authors may be required to re-submit their submissions if they are not in the proper
format. No in-text citations will be accepted.
No bibliography is required; however, all papers should be well-documented with the
supporting references appropriately cited in footnotes that strictly follow the
Submission Guidelines:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Direct all questions to: editor@henley-putnam.edu
Review Process
All papers deemed suitable and within the Journal’s scope will be sent for peer review.
The author may be asked to make changes as requested by the reviewer and editor
before the work is published. Only original manuscripts not previously published or
under consideration for publication elsewhere will be considered. If accepted for
publication, manuscripts cannot be published elsewhere without written permission
from Henley-Putnam University Press.
About Henley-Putnam University
Henley-Putnam University (HPU) is a leader in the developing field of Strategic
Security. HPU uniquely offers a focused curriculum, advanced degrees, collaboration
across military, law enforcement, and intelligence community boundaries, and real-
world experience from its faculty and founders. The University is nationally accredited
by the Distance Education and Training Council, an accrediting body recognized by the
U.S. Department of Education, to offer bachelors and masters degrees in Intelligence
Management, Terrorism and Counterterrorism Studies, and Strategic Security and
Protection Management, and a professional Doctorate in Strategic Security (DSS). Visit
us online at: http://www.henley-putnam.edu.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Luna Zeng
 
Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...
Emma Morris
 
Military's social science grants raise alarm
Military's social science grants raise alarmMilitary's social science grants raise alarm
Military's social science grants raise alarm
leopinho12
 
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipGODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
Amélie Godefroidt
 
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing CountriesPoverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Stockholm Institute of Transition Economics
 
Holistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionHolistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC Version
Shoshanna Silverberg
 
Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...
Stockholm Institute of Transition Economics
 
Political Myths of the African Great Lakes Region
Political Myths of the African Great Lakes RegionPolitical Myths of the African Great Lakes Region
Political Myths of the African Great Lakes Region
ijtsrd
 

Was ist angesagt? (20)

Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
 
Populism: Demand and Supply
Populism: Demand and SupplyPopulism: Demand and Supply
Populism: Demand and Supply
 
Leadership Alexandra.S.N
Leadership Alexandra.S.NLeadership Alexandra.S.N
Leadership Alexandra.S.N
 
Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...
 
Military's social science grants raise alarm
Military's social science grants raise alarmMilitary's social science grants raise alarm
Military's social science grants raise alarm
 
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipGODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
 
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing CountriesPoverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
 
GaultGWKWgCdr
GaultGWKWgCdrGaultGWKWgCdr
GaultGWKWgCdr
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research Presentation
 
LGA Syllabus Spring2003
LGA Syllabus Spring2003LGA Syllabus Spring2003
LGA Syllabus Spring2003
 
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Holistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionHolistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC Version
 
Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...
 
Washington
WashingtonWashington
Washington
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda Robinson
 
Beijing Agenda 2016
Beijing Agenda 2016Beijing Agenda 2016
Beijing Agenda 2016
 
Political Myths of the African Great Lakes Region
Political Myths of the African Great Lakes RegionPolitical Myths of the African Great Lakes Region
Political Myths of the African Great Lakes Region
 
São Paolo Conference 2017
São Paolo Conference 2017São Paolo Conference 2017
São Paolo Conference 2017
 

Andere mochten auch

Resume_Kadambi Vijaisimh_April_2016
Resume_Kadambi Vijaisimh_April_2016Resume_Kadambi Vijaisimh_April_2016
Resume_Kadambi Vijaisimh_April_2016
Kadambi Vijaisimh
 
Os tempos livres o uso de já nunca e ainda não
Os tempos livres   o uso de já nunca e ainda não Os tempos livres   o uso de já nunca e ainda não
Os tempos livres o uso de já nunca e ainda não
Sandrine Sousa
 
Revisions teste 23 mai
Revisions teste 23 maiRevisions teste 23 mai
Revisions teste 23 mai
Sandrine Sousa
 
Sample Lucene Big Data Diagram Generic
Sample Lucene Big Data Diagram GenericSample Lucene Big Data Diagram Generic
Sample Lucene Big Data Diagram Generic
Ken Irwin
 
Paris hilton conhece o diabo
Paris hilton conhece o diaboParis hilton conhece o diabo
Paris hilton conhece o diabo
martasacadura
 

Andere mochten auch (15)

Teorias que constribuyen a la resolucion de conflictos
Teorias que constribuyen a la resolucion de conflictosTeorias que constribuyen a la resolucion de conflictos
Teorias que constribuyen a la resolucion de conflictos
 
cap.3
cap.3cap.3
cap.3
 
Resume_Kadambi Vijaisimh_April_2016
Resume_Kadambi Vijaisimh_April_2016Resume_Kadambi Vijaisimh_April_2016
Resume_Kadambi Vijaisimh_April_2016
 
Os tempos livres o uso de já nunca e ainda não
Os tempos livres   o uso de já nunca e ainda não Os tempos livres   o uso de já nunca e ainda não
Os tempos livres o uso de já nunca e ainda não
 
Revisions teste 23 mai
Revisions teste 23 maiRevisions teste 23 mai
Revisions teste 23 mai
 
Le présent révision
Le présent   révisionLe présent   révision
Le présent révision
 
Appreciation
AppreciationAppreciation
Appreciation
 
Sample Lucene Big Data Diagram Generic
Sample Lucene Big Data Diagram GenericSample Lucene Big Data Diagram Generic
Sample Lucene Big Data Diagram Generic
 
Sistematika penulisan tugas akhir rev I
Sistematika penulisan tugas akhir rev ISistematika penulisan tugas akhir rev I
Sistematika penulisan tugas akhir rev I
 
teste
testeteste
teste
 
SC - Sistema Prisional em Números
SC - Sistema Prisional em NúmerosSC - Sistema Prisional em Números
SC - Sistema Prisional em Números
 
Paris hilton conhece o diabo
Paris hilton conhece o diaboParis hilton conhece o diabo
Paris hilton conhece o diabo
 
Presídios no Brasil
Presídios no BrasilPresídios no Brasil
Presídios no Brasil
 
Anatomia - Sistema nervoso
Anatomia - Sistema nervosoAnatomia - Sistema nervoso
Anatomia - Sistema nervoso
 
Primeiros Socorros - Sinais vitais
Primeiros Socorros - Sinais vitaisPrimeiros Socorros - Sinais vitais
Primeiros Socorros - Sinais vitais
 

Ähnlich wie Journal of Strategic Security cfp summer 2016

Sex Trafficking Essay.pdf
Sex Trafficking Essay.pdfSex Trafficking Essay.pdf
Sex Trafficking Essay.pdf
Anna May
 
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleySGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
Hannah Al Ghareeb
 
3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press
freedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
freedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
freedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
freedma5
 
Problems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfProblems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdf
Amy Cruz
 
Legalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfLegalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdf
Susan Ramos
 
what_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfwhat_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdf
ssuser5300ee
 
Essays On Terrorism International.pdf
Essays On Terrorism International.pdfEssays On Terrorism International.pdf
Essays On Terrorism International.pdf
Nikki Wheeler
 
Argumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeArgumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling College
Brenda Gutierrez
 
Running Head Annotated bibliography 1Annotated bibliogr.docx
Running Head Annotated bibliography   1Annotated bibliogr.docxRunning Head Annotated bibliography   1Annotated bibliogr.docx
Running Head Annotated bibliography 1Annotated bibliogr.docx
WilheminaRossi174
 
Essay On Human Population.pdf
Essay On Human Population.pdfEssay On Human Population.pdf
Essay On Human Population.pdf
Erin Byers
 

Ähnlich wie Journal of Strategic Security cfp summer 2016 (20)

Sex Trafficking Essay.pdf
Sex Trafficking Essay.pdfSex Trafficking Essay.pdf
Sex Trafficking Essay.pdf
 
The major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docxThe major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docx
 
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleySGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
 
Sex In The Media Essay.pdf
Sex In The Media Essay.pdfSex In The Media Essay.pdf
Sex In The Media Essay.pdf
 
3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
Problems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfProblems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdf
 
Legalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfLegalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdf
 
Essay On Gang Violence.pdf
Essay On Gang Violence.pdfEssay On Gang Violence.pdf
Essay On Gang Violence.pdf
 
Illegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdfIllegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdf
 
what_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfwhat_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdf
 
Media Censorship Essay.pdf
Media Censorship Essay.pdfMedia Censorship Essay.pdf
Media Censorship Essay.pdf
 
Essays On Terrorism International.pdf
Essays On Terrorism International.pdfEssays On Terrorism International.pdf
Essays On Terrorism International.pdf
 
Argumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeArgumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling College
 
Running Head Annotated bibliography 1Annotated bibliogr.docx
Running Head Annotated bibliography   1Annotated bibliogr.docxRunning Head Annotated bibliography   1Annotated bibliogr.docx
Running Head Annotated bibliography 1Annotated bibliogr.docx
 
Human Trafficking Essays.pdf
Human Trafficking Essays.pdfHuman Trafficking Essays.pdf
Human Trafficking Essays.pdf
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health Essay
 
Essay On Human Population.pdf
Essay On Human Population.pdfEssay On Human Population.pdf
Essay On Human Population.pdf
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Journal of Strategic Security cfp summer 2016

  • 1. Journal of Strategic Security (JSS) Call for Papers The Strategic Security of Ephemeral Global Identities Guest Editor: Matt Armstrong1 Deadline: March 15, 2016 Submit online: http://scholarcommons.usf.edu/jss/ Email questions: editor@henley-putnam.edu The Journal of Strategic Security (JSS), a publication of Henley-Putnam University, seeks manuscripts for an upcoming special issue on future trends global identities for the Summer 2016 issue, Vol. 9, No. 2, featuring our Guest Editor, Matt Armstrong. Around the globe, burgeoning marketplaces of ideas and loyalties threaten traditional models of both nationalism and governance. Sometimes erroneously labeled a “war of ideas,” these marketplaces are empowered by today’s communication and transportation networks. Today, the networks that facilitate inexpensive information and human flows are permitting a new kind of reach and engagement not possible before. Social media, peer- to-peer communications, websites, encryption technologies, satellite TV, and systems can provide a rich experience personalized to an individual or group. This can be done at little to no cost and without the participation or knowledge of societal and governmental “gatekeepers”—peer groups, institutions, and even family members. On both sides of the transaction, barriers to group membership are increasingly bypassed or 1 Matt Armstrong is an author, advisor, and lecturer on public diplomacy and international media. He sits on several boards, including the Public Diplomacy Council and the Broadcasting Board of Governors, and in 2004, he launched the widely-read public diplomacy blog, www.MountainRunner.us. He is nearly finished with his first book, a work that examines the original purpose and design of U.S. government international media and public diplomacy as it began and evolved from 1917 to 1948.
  • 2. negotiable in the interest of the group. A person no longer needs to be of a certain ethnicity, from a culture, or speak a language to be virtually transported anywhere to find a feeling of belonging and acceptance. Increasingly, these conditions remove, or at least mitigate, pressure to assimilate or conform to local societal, even legal, norms. What has emerged is a marketplace where people may opt-in, or “test drive,” multiple identities at once without needing to commit to one. Connections can be made and maintained online, asynchronously, or in-person. Conversely, a person may opt-out of an identity. She may be curious or disenfranchised and new identities previously difficult, if not impossible, to reach are now available. He may want to reestablish a link to his ancestry or with family that did not migrate. Empathy or political disagreement offer two of many other possible motivations. As the marketplace of ideas manifests as a marketplace of loyalty, the impact on domestic and foreign policies on all kinds of states is real. While expensive shortwave radio reached across borders and affected the loyalty of untold numbers of listeners, the transaction costs of today’s marketplace is nearly zero. Virtually anyone can be a “broadcaster” now and participate in conversations discretely. Barriers to action have also changed. Individuals and groups have an increasing vote in security affairs, from contemplating and executing events of disruption and destruction, to leaking secrets, to recruiting campaigns, to shaping political environments for governments. In other words, the stakes are greater now.  What is the meaning of citizenship, loyalty to the state, accountability of a citizen to the state, and of a state for the actions of its citizens?  Is the relevancy and impact of nationalism and citizenship understood in this new marketplace of ideas, identities, and loyalties?  How does the state react to this marketplace? What do defensive and offensive measures look like to capture or retain “market share”?  Does the marketplace work differently in liberal democracies than in illiberal regimes?  What is the relationship between identity politics domestically and the marketplace of loyalties on a transnational scale?
  • 3. Authors from business, government, and academic sectors are encouraged to submit their research for this issue of the Journal of Strategic Security. We are especially eager to receive papers on these and related topics with an international perspective. The Journal looks forward to reviewing manuscripts beginning on the March 15, 2016 submission deadline.  Submit papers online at: http://scholarcommons.usf.edu/jss/.  Please contact: editor@henley-putnam.edu for more information.  Submission information and links can also be found below. About the Journal of Strategic Security The Journal of Strategic Security is a peer-reviewed professional journal published quarterly by Henley-Putnam University Press. JSS provides a multi-disciplinary forum for scholarship and discussion of strategic security issues drawing from the fields of intelligence, terrorism and counterterrorism studies and protection, among others. The Journal encourages diversity in theoretical foundations, research methods, and approaches. Quantitative and qualitative studies, for example, each offer valuable contributions to the field of strategic security. Academic disciplines of anthropology, criminology, economics, history, international relations, political science, psychology, and sociology are welcome, as are the applied scholarly fields of security studies, strategic studies, and intelligence studies. JSS emphasizes contemporary security issues, so manuscripts focused on non-state actors are of particular interest. Topics such as counter-terrorism, jihadist ideology, genocide, global policing, insurgencies, intelligence, inter-state armed conflict, irregular warfare, radicalization, risk management, terrorism, threat assessment, and violent extremism are well suited to the Journal, as are contributions on security threats arising from transnational crime, global climate change, failing states, energy and environmental security issues, and health crises such as pandemics.
  • 4. JSS publishes review articles, original empirical research, and analytic/conceptual works that contribute to a better understanding of security-related threats and ways to prevent or mitigate their impact. Each article should analyze and include implications for policy and practice. Please direct all questions to: editor@henley-putnam.edu. Who Should Submit? We welcome submissions from students, practitioners, scholars, and experts from the intelligence, military, and law enforcement communities, as well as from government, academia, and the private sector. If you have a proposal for a paper or a completed manuscript, please submit it for consideration according to the instructions below. Submission Guidelines: http://scholarcommons.usf.edu/jss/submissionguidelines.html Articles should be approximately 5,000 words. Occasionally, we print longer pieces (up to 10,000 words) depending on the context and advanced notification. Format All documents should be in Microsoft Word format and submitted though the Journal’s online manuscript management system: http://scholarcommons.usf.edu/jss/. No hard copy submissions will be accepted. Submitted articles should be in 11.5 pt. Georgia font. Please visit our Submission Guidelines for more details: http://scholarcommons.usf.edu/jss/submissionguidelines.html Annotations To receive full consideration for publication, all submissions must be carefully referenced using footnotes that include, if applicable, the URL of online sources.
  • 5. Authors may be required to re-submit their submissions if they are not in the proper format. No in-text citations will be accepted. No bibliography is required; however, all papers should be well-documented with the supporting references appropriately cited in footnotes that strictly follow the Submission Guidelines: http://scholarcommons.usf.edu/jss/submissionguidelines.html Direct all questions to: editor@henley-putnam.edu
  • 6. Review Process All papers deemed suitable and within the Journal’s scope will be sent for peer review. The author may be asked to make changes as requested by the reviewer and editor before the work is published. Only original manuscripts not previously published or under consideration for publication elsewhere will be considered. If accepted for publication, manuscripts cannot be published elsewhere without written permission from Henley-Putnam University Press. About Henley-Putnam University Henley-Putnam University (HPU) is a leader in the developing field of Strategic Security. HPU uniquely offers a focused curriculum, advanced degrees, collaboration across military, law enforcement, and intelligence community boundaries, and real- world experience from its faculty and founders. The University is nationally accredited by the Distance Education and Training Council, an accrediting body recognized by the U.S. Department of Education, to offer bachelors and masters degrees in Intelligence Management, Terrorism and Counterterrorism Studies, and Strategic Security and Protection Management, and a professional Doctorate in Strategic Security (DSS). Visit us online at: http://www.henley-putnam.edu.