SlideShare a Scribd company logo
1 of 6
Download to read offline
Journal of Strategic Security (JSS)
Call for Papers
The Strategic Security of Ephemeral Global
Identities
Guest Editor: Matt Armstrong1
Deadline: March 15, 2016
Submit online: http://scholarcommons.usf.edu/jss/
Email questions: editor@henley-putnam.edu
The Journal of Strategic Security (JSS), a publication of Henley-Putnam University,
seeks manuscripts for an upcoming special issue on future trends global identities for
the Summer 2016 issue, Vol. 9, No. 2, featuring our Guest Editor, Matt Armstrong.
Around the globe, burgeoning marketplaces of ideas and loyalties threaten traditional
models of both nationalism and governance. Sometimes erroneously labeled a “war of
ideas,” these marketplaces are empowered by today’s communication and
transportation networks.
Today, the networks that facilitate inexpensive information and human flows are
permitting a new kind of reach and engagement not possible before. Social media, peer-
to-peer communications, websites, encryption technologies, satellite TV, and systems
can provide a rich experience personalized to an individual or group. This can be done
at little to no cost and without the participation or knowledge of societal and
governmental “gatekeepers”—peer groups, institutions, and even family members. On
both sides of the transaction, barriers to group membership are increasingly bypassed or
1 Matt Armstrong is an author, advisor, and lecturer on public diplomacy and international media. He sits
on several boards, including the Public Diplomacy Council and the Broadcasting Board of Governors, and
in 2004, he launched the widely-read public diplomacy blog, www.MountainRunner.us. He is nearly
finished with his first book, a work that examines the original purpose and design of U.S. government
international media and public diplomacy as it began and evolved from 1917 to 1948.
negotiable in the interest of the group. A person no longer needs to be of a certain
ethnicity, from a culture, or speak a language to be virtually transported anywhere to
find a feeling of belonging and acceptance. Increasingly, these conditions remove, or at
least mitigate, pressure to assimilate or conform to local societal, even legal, norms.
What has emerged is a marketplace where people may opt-in, or “test drive,” multiple
identities at once without needing to commit to one. Connections can be made and
maintained online, asynchronously, or in-person. Conversely, a person may opt-out of
an identity. She may be curious or disenfranchised and new identities previously
difficult, if not impossible, to reach are now available. He may want to reestablish a link
to his ancestry or with family that did not migrate. Empathy or political disagreement
offer two of many other possible motivations.
As the marketplace of ideas manifests as a marketplace of loyalty, the impact on
domestic and foreign policies on all kinds of states is real. While expensive shortwave
radio reached across borders and affected the loyalty of untold numbers of listeners, the
transaction costs of today’s marketplace is nearly zero. Virtually anyone can be a
“broadcaster” now and participate in conversations discretely. Barriers to action have
also changed. Individuals and groups have an increasing vote in security affairs, from
contemplating and executing events of disruption and destruction, to leaking secrets, to
recruiting campaigns, to shaping political environments for governments. In other
words, the stakes are greater now.
 What is the meaning of citizenship, loyalty to the state, accountability of a citizen
to the state, and of a state for the actions of its citizens?
 Is the relevancy and impact of nationalism and citizenship understood in this
new marketplace of ideas, identities, and loyalties?
 How does the state react to this marketplace? What do defensive and offensive
measures look like to capture or retain “market share”?
 Does the marketplace work differently in liberal democracies than in illiberal
regimes?
 What is the relationship between identity politics domestically and the
marketplace of loyalties on a transnational scale?
Authors from business, government, and academic sectors are encouraged to submit
their research for this issue of the Journal of Strategic Security. We are especially eager
to receive papers on these and related topics with an international perspective.
The Journal looks forward to reviewing manuscripts beginning on the March 15, 2016
submission deadline.
 Submit papers online at: http://scholarcommons.usf.edu/jss/.
 Please contact: editor@henley-putnam.edu for more information.
 Submission information and links can also be found below.
About the Journal of Strategic Security
The Journal of Strategic Security is a peer-reviewed professional journal published
quarterly by Henley-Putnam University Press. JSS provides a multi-disciplinary forum
for scholarship and discussion of strategic security issues drawing from the fields of
intelligence, terrorism and counterterrorism studies and protection, among others.
The Journal encourages diversity in theoretical foundations, research methods, and
approaches. Quantitative and qualitative studies, for example, each offer valuable
contributions to the field of strategic security. Academic disciplines of anthropology,
criminology, economics, history, international relations, political science, psychology,
and sociology are welcome, as are the applied scholarly fields of security studies,
strategic studies, and intelligence studies.
JSS emphasizes contemporary security issues, so manuscripts focused on non-state
actors are of particular interest. Topics such as counter-terrorism, jihadist ideology,
genocide, global policing, insurgencies, intelligence, inter-state armed conflict, irregular
warfare, radicalization, risk management, terrorism, threat assessment, and violent
extremism are well suited to the Journal, as are contributions on security threats arising
from transnational crime, global climate change, failing states, energy and
environmental security issues, and health crises such as pandemics.
JSS publishes review articles, original empirical research, and analytic/conceptual
works that contribute to a better understanding of security-related threats and ways to
prevent or mitigate their impact. Each article should analyze and include implications
for policy and practice.
Please direct all questions to: editor@henley-putnam.edu.
Who Should Submit?
We welcome submissions from students, practitioners, scholars, and experts from the
intelligence, military, and law enforcement communities, as well as from government,
academia, and the private sector. If you have a proposal for a paper or a completed
manuscript, please submit it for consideration according to the instructions below.
Submission Guidelines:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Articles should be approximately 5,000 words. Occasionally, we print longer pieces (up
to 10,000 words) depending on the context and advanced notification.
Format
All documents should be in Microsoft Word format and submitted though the Journal’s
online manuscript management system: http://scholarcommons.usf.edu/jss/. No
hard copy submissions will be accepted. Submitted articles should be in 11.5 pt. Georgia
font. Please visit our Submission Guidelines for more details:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Annotations
To receive full consideration for publication, all submissions must be carefully
referenced using footnotes that include, if applicable, the URL of online sources.
Authors may be required to re-submit their submissions if they are not in the proper
format. No in-text citations will be accepted.
No bibliography is required; however, all papers should be well-documented with the
supporting references appropriately cited in footnotes that strictly follow the
Submission Guidelines:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Direct all questions to: editor@henley-putnam.edu
Review Process
All papers deemed suitable and within the Journal’s scope will be sent for peer review.
The author may be asked to make changes as requested by the reviewer and editor
before the work is published. Only original manuscripts not previously published or
under consideration for publication elsewhere will be considered. If accepted for
publication, manuscripts cannot be published elsewhere without written permission
from Henley-Putnam University Press.
About Henley-Putnam University
Henley-Putnam University (HPU) is a leader in the developing field of Strategic
Security. HPU uniquely offers a focused curriculum, advanced degrees, collaboration
across military, law enforcement, and intelligence community boundaries, and real-
world experience from its faculty and founders. The University is nationally accredited
by the Distance Education and Training Council, an accrediting body recognized by the
U.S. Department of Education, to offer bachelors and masters degrees in Intelligence
Management, Terrorism and Counterterrorism Studies, and Strategic Security and
Protection Management, and a professional Doctorate in Strategic Security (DSS). Visit
us online at: http://www.henley-putnam.edu.

More Related Content

What's hot

Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Luna Zeng
 
Leadership Alexandra.S.N
Leadership Alexandra.S.NLeadership Alexandra.S.N
Leadership Alexandra.S.NAlexandra NI
 
Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Emma Morris
 
Military's social science grants raise alarm
Military's social science grants raise alarmMilitary's social science grants raise alarm
Military's social science grants raise alarmleopinho12
 
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipGODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipAmélie Godefroidt
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillithSolomon
 
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...inventionjournals
 
Holistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionHolistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionShoshanna Silverberg
 
Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Stockholm Institute of Transition Economics
 
Washington
WashingtonWashington
Washington41kreal
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonThe Free School
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonDaniel Ross
 
Beijing Agenda 2016
Beijing Agenda 2016Beijing Agenda 2016
Beijing Agenda 2016DreaCofield
 
Political Myths of the African Great Lakes Region
Political Myths of the African Great Lakes RegionPolitical Myths of the African Great Lakes Region
Political Myths of the African Great Lakes Regionijtsrd
 
São Paolo Conference 2017
São Paolo Conference 2017São Paolo Conference 2017
São Paolo Conference 2017DreaCofield
 

What's hot (20)

Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
 
Populism: Demand and Supply
Populism: Demand and SupplyPopulism: Demand and Supply
Populism: Demand and Supply
 
Leadership Alexandra.S.N
Leadership Alexandra.S.NLeadership Alexandra.S.N
Leadership Alexandra.S.N
 
Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...
 
Military's social science grants raise alarm
Military's social science grants raise alarmMilitary's social science grants raise alarm
Military's social science grants raise alarm
 
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipGODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
 
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing CountriesPoverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
 
GaultGWKWgCdr
GaultGWKWgCdrGaultGWKWgCdr
GaultGWKWgCdr
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research Presentation
 
LGA Syllabus Spring2003
LGA Syllabus Spring2003LGA Syllabus Spring2003
LGA Syllabus Spring2003
 
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Holistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionHolistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC Version
 
Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...
 
Washington
WashingtonWashington
Washington
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda Robinson
 
Beijing Agenda 2016
Beijing Agenda 2016Beijing Agenda 2016
Beijing Agenda 2016
 
Political Myths of the African Great Lakes Region
Political Myths of the African Great Lakes RegionPolitical Myths of the African Great Lakes Region
Political Myths of the African Great Lakes Region
 
São Paolo Conference 2017
São Paolo Conference 2017São Paolo Conference 2017
São Paolo Conference 2017
 

Similar to Journal of Strategic Security cfp summer 2016

Sex Trafficking Essay.pdf
Sex Trafficking Essay.pdfSex Trafficking Essay.pdf
Sex Trafficking Essay.pdfAnna May
 
The major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docxThe major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docxintel-writers.com
 
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleySGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleyHannah Al Ghareeb
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blogfreedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blogfreedma5
 
3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word pressfreedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blogfreedma5
 
Problems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfProblems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfAmy Cruz
 
Legalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfLegalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfSusan Ramos
 
Essay On Gang Violence.pdf
Essay On Gang Violence.pdfEssay On Gang Violence.pdf
Essay On Gang Violence.pdfJennifer Smith
 
Illegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdfIllegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdfKeri Goodman
 
what_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfwhat_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfssuser5300ee
 
Media Censorship Essay.pdf
Media Censorship Essay.pdfMedia Censorship Essay.pdf
Media Censorship Essay.pdfErin Byers
 
Essays On Terrorism International.pdf
Essays On Terrorism International.pdfEssays On Terrorism International.pdf
Essays On Terrorism International.pdfNikki Wheeler
 
Argumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeArgumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeBrenda Gutierrez
 
Running Head Annotated bibliography 1Annotated bibliogr.docx
Running Head Annotated bibliography   1Annotated bibliogr.docxRunning Head Annotated bibliography   1Annotated bibliogr.docx
Running Head Annotated bibliography 1Annotated bibliogr.docxWilheminaRossi174
 
Human Trafficking Essays.pdf
Human Trafficking Essays.pdfHuman Trafficking Essays.pdf
Human Trafficking Essays.pdfAndrea Lawson
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health EssayElizabeth Lewis
 
Essay On Human Population.pdf
Essay On Human Population.pdfEssay On Human Population.pdf
Essay On Human Population.pdfErin Byers
 

Similar to Journal of Strategic Security cfp summer 2016 (20)

Sex Trafficking Essay.pdf
Sex Trafficking Essay.pdfSex Trafficking Essay.pdf
Sex Trafficking Essay.pdf
 
The major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docxThe major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docx
 
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleySGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
 
Sex In The Media Essay.pdf
Sex In The Media Essay.pdfSex In The Media Essay.pdf
Sex In The Media Essay.pdf
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
Problems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfProblems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdf
 
Legalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfLegalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdf
 
Essay On Gang Violence.pdf
Essay On Gang Violence.pdfEssay On Gang Violence.pdf
Essay On Gang Violence.pdf
 
Illegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdfIllegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdf
 
what_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfwhat_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdf
 
Media Censorship Essay.pdf
Media Censorship Essay.pdfMedia Censorship Essay.pdf
Media Censorship Essay.pdf
 
Essays On Terrorism International.pdf
Essays On Terrorism International.pdfEssays On Terrorism International.pdf
Essays On Terrorism International.pdf
 
Argumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeArgumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling College
 
Running Head Annotated bibliography 1Annotated bibliogr.docx
Running Head Annotated bibliography   1Annotated bibliogr.docxRunning Head Annotated bibliography   1Annotated bibliogr.docx
Running Head Annotated bibliography 1Annotated bibliogr.docx
 
Human Trafficking Essays.pdf
Human Trafficking Essays.pdfHuman Trafficking Essays.pdf
Human Trafficking Essays.pdf
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health Essay
 
Essay On Human Population.pdf
Essay On Human Population.pdfEssay On Human Population.pdf
Essay On Human Population.pdf
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 

Recently uploaded (20)

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 

Journal of Strategic Security cfp summer 2016

  • 1. Journal of Strategic Security (JSS) Call for Papers The Strategic Security of Ephemeral Global Identities Guest Editor: Matt Armstrong1 Deadline: March 15, 2016 Submit online: http://scholarcommons.usf.edu/jss/ Email questions: editor@henley-putnam.edu The Journal of Strategic Security (JSS), a publication of Henley-Putnam University, seeks manuscripts for an upcoming special issue on future trends global identities for the Summer 2016 issue, Vol. 9, No. 2, featuring our Guest Editor, Matt Armstrong. Around the globe, burgeoning marketplaces of ideas and loyalties threaten traditional models of both nationalism and governance. Sometimes erroneously labeled a “war of ideas,” these marketplaces are empowered by today’s communication and transportation networks. Today, the networks that facilitate inexpensive information and human flows are permitting a new kind of reach and engagement not possible before. Social media, peer- to-peer communications, websites, encryption technologies, satellite TV, and systems can provide a rich experience personalized to an individual or group. This can be done at little to no cost and without the participation or knowledge of societal and governmental “gatekeepers”—peer groups, institutions, and even family members. On both sides of the transaction, barriers to group membership are increasingly bypassed or 1 Matt Armstrong is an author, advisor, and lecturer on public diplomacy and international media. He sits on several boards, including the Public Diplomacy Council and the Broadcasting Board of Governors, and in 2004, he launched the widely-read public diplomacy blog, www.MountainRunner.us. He is nearly finished with his first book, a work that examines the original purpose and design of U.S. government international media and public diplomacy as it began and evolved from 1917 to 1948.
  • 2. negotiable in the interest of the group. A person no longer needs to be of a certain ethnicity, from a culture, or speak a language to be virtually transported anywhere to find a feeling of belonging and acceptance. Increasingly, these conditions remove, or at least mitigate, pressure to assimilate or conform to local societal, even legal, norms. What has emerged is a marketplace where people may opt-in, or “test drive,” multiple identities at once without needing to commit to one. Connections can be made and maintained online, asynchronously, or in-person. Conversely, a person may opt-out of an identity. She may be curious or disenfranchised and new identities previously difficult, if not impossible, to reach are now available. He may want to reestablish a link to his ancestry or with family that did not migrate. Empathy or political disagreement offer two of many other possible motivations. As the marketplace of ideas manifests as a marketplace of loyalty, the impact on domestic and foreign policies on all kinds of states is real. While expensive shortwave radio reached across borders and affected the loyalty of untold numbers of listeners, the transaction costs of today’s marketplace is nearly zero. Virtually anyone can be a “broadcaster” now and participate in conversations discretely. Barriers to action have also changed. Individuals and groups have an increasing vote in security affairs, from contemplating and executing events of disruption and destruction, to leaking secrets, to recruiting campaigns, to shaping political environments for governments. In other words, the stakes are greater now.  What is the meaning of citizenship, loyalty to the state, accountability of a citizen to the state, and of a state for the actions of its citizens?  Is the relevancy and impact of nationalism and citizenship understood in this new marketplace of ideas, identities, and loyalties?  How does the state react to this marketplace? What do defensive and offensive measures look like to capture or retain “market share”?  Does the marketplace work differently in liberal democracies than in illiberal regimes?  What is the relationship between identity politics domestically and the marketplace of loyalties on a transnational scale?
  • 3. Authors from business, government, and academic sectors are encouraged to submit their research for this issue of the Journal of Strategic Security. We are especially eager to receive papers on these and related topics with an international perspective. The Journal looks forward to reviewing manuscripts beginning on the March 15, 2016 submission deadline.  Submit papers online at: http://scholarcommons.usf.edu/jss/.  Please contact: editor@henley-putnam.edu for more information.  Submission information and links can also be found below. About the Journal of Strategic Security The Journal of Strategic Security is a peer-reviewed professional journal published quarterly by Henley-Putnam University Press. JSS provides a multi-disciplinary forum for scholarship and discussion of strategic security issues drawing from the fields of intelligence, terrorism and counterterrorism studies and protection, among others. The Journal encourages diversity in theoretical foundations, research methods, and approaches. Quantitative and qualitative studies, for example, each offer valuable contributions to the field of strategic security. Academic disciplines of anthropology, criminology, economics, history, international relations, political science, psychology, and sociology are welcome, as are the applied scholarly fields of security studies, strategic studies, and intelligence studies. JSS emphasizes contemporary security issues, so manuscripts focused on non-state actors are of particular interest. Topics such as counter-terrorism, jihadist ideology, genocide, global policing, insurgencies, intelligence, inter-state armed conflict, irregular warfare, radicalization, risk management, terrorism, threat assessment, and violent extremism are well suited to the Journal, as are contributions on security threats arising from transnational crime, global climate change, failing states, energy and environmental security issues, and health crises such as pandemics.
  • 4. JSS publishes review articles, original empirical research, and analytic/conceptual works that contribute to a better understanding of security-related threats and ways to prevent or mitigate their impact. Each article should analyze and include implications for policy and practice. Please direct all questions to: editor@henley-putnam.edu. Who Should Submit? We welcome submissions from students, practitioners, scholars, and experts from the intelligence, military, and law enforcement communities, as well as from government, academia, and the private sector. If you have a proposal for a paper or a completed manuscript, please submit it for consideration according to the instructions below. Submission Guidelines: http://scholarcommons.usf.edu/jss/submissionguidelines.html Articles should be approximately 5,000 words. Occasionally, we print longer pieces (up to 10,000 words) depending on the context and advanced notification. Format All documents should be in Microsoft Word format and submitted though the Journal’s online manuscript management system: http://scholarcommons.usf.edu/jss/. No hard copy submissions will be accepted. Submitted articles should be in 11.5 pt. Georgia font. Please visit our Submission Guidelines for more details: http://scholarcommons.usf.edu/jss/submissionguidelines.html Annotations To receive full consideration for publication, all submissions must be carefully referenced using footnotes that include, if applicable, the URL of online sources.
  • 5. Authors may be required to re-submit their submissions if they are not in the proper format. No in-text citations will be accepted. No bibliography is required; however, all papers should be well-documented with the supporting references appropriately cited in footnotes that strictly follow the Submission Guidelines: http://scholarcommons.usf.edu/jss/submissionguidelines.html Direct all questions to: editor@henley-putnam.edu
  • 6. Review Process All papers deemed suitable and within the Journal’s scope will be sent for peer review. The author may be asked to make changes as requested by the reviewer and editor before the work is published. Only original manuscripts not previously published or under consideration for publication elsewhere will be considered. If accepted for publication, manuscripts cannot be published elsewhere without written permission from Henley-Putnam University Press. About Henley-Putnam University Henley-Putnam University (HPU) is a leader in the developing field of Strategic Security. HPU uniquely offers a focused curriculum, advanced degrees, collaboration across military, law enforcement, and intelligence community boundaries, and real- world experience from its faculty and founders. The University is nationally accredited by the Distance Education and Training Council, an accrediting body recognized by the U.S. Department of Education, to offer bachelors and masters degrees in Intelligence Management, Terrorism and Counterterrorism Studies, and Strategic Security and Protection Management, and a professional Doctorate in Strategic Security (DSS). Visit us online at: http://www.henley-putnam.edu.