SlideShare a Scribd company logo
Journal of Strategic Security (JSS)
Call for Papers
The Strategic Security of Ephemeral Global
Identities
Guest Editor: Matt Armstrong1
Deadline: March 15, 2016
Submit online: http://scholarcommons.usf.edu/jss/
Email questions: editor@henley-putnam.edu
The Journal of Strategic Security (JSS), a publication of Henley-Putnam University,
seeks manuscripts for an upcoming special issue on future trends global identities for
the Summer 2016 issue, Vol. 9, No. 2, featuring our Guest Editor, Matt Armstrong.
Around the globe, burgeoning marketplaces of ideas and loyalties threaten traditional
models of both nationalism and governance. Sometimes erroneously labeled a “war of
ideas,” these marketplaces are empowered by today’s communication and
transportation networks.
Today, the networks that facilitate inexpensive information and human flows are
permitting a new kind of reach and engagement not possible before. Social media, peer-
to-peer communications, websites, encryption technologies, satellite TV, and systems
can provide a rich experience personalized to an individual or group. This can be done
at little to no cost and without the participation or knowledge of societal and
governmental “gatekeepers”—peer groups, institutions, and even family members. On
both sides of the transaction, barriers to group membership are increasingly bypassed or
1 Matt Armstrong is an author, advisor, and lecturer on public diplomacy and international media. He sits
on several boards, including the Public Diplomacy Council and the Broadcasting Board of Governors, and
in 2004, he launched the widely-read public diplomacy blog, www.MountainRunner.us. He is nearly
finished with his first book, a work that examines the original purpose and design of U.S. government
international media and public diplomacy as it began and evolved from 1917 to 1948.
negotiable in the interest of the group. A person no longer needs to be of a certain
ethnicity, from a culture, or speak a language to be virtually transported anywhere to
find a feeling of belonging and acceptance. Increasingly, these conditions remove, or at
least mitigate, pressure to assimilate or conform to local societal, even legal, norms.
What has emerged is a marketplace where people may opt-in, or “test drive,” multiple
identities at once without needing to commit to one. Connections can be made and
maintained online, asynchronously, or in-person. Conversely, a person may opt-out of
an identity. She may be curious or disenfranchised and new identities previously
difficult, if not impossible, to reach are now available. He may want to reestablish a link
to his ancestry or with family that did not migrate. Empathy or political disagreement
offer two of many other possible motivations.
As the marketplace of ideas manifests as a marketplace of loyalty, the impact on
domestic and foreign policies on all kinds of states is real. While expensive shortwave
radio reached across borders and affected the loyalty of untold numbers of listeners, the
transaction costs of today’s marketplace is nearly zero. Virtually anyone can be a
“broadcaster” now and participate in conversations discretely. Barriers to action have
also changed. Individuals and groups have an increasing vote in security affairs, from
contemplating and executing events of disruption and destruction, to leaking secrets, to
recruiting campaigns, to shaping political environments for governments. In other
words, the stakes are greater now.
 What is the meaning of citizenship, loyalty to the state, accountability of a citizen
to the state, and of a state for the actions of its citizens?
 Is the relevancy and impact of nationalism and citizenship understood in this
new marketplace of ideas, identities, and loyalties?
 How does the state react to this marketplace? What do defensive and offensive
measures look like to capture or retain “market share”?
 Does the marketplace work differently in liberal democracies than in illiberal
regimes?
 What is the relationship between identity politics domestically and the
marketplace of loyalties on a transnational scale?
Authors from business, government, and academic sectors are encouraged to submit
their research for this issue of the Journal of Strategic Security. We are especially eager
to receive papers on these and related topics with an international perspective.
The Journal looks forward to reviewing manuscripts beginning on the March 15, 2016
submission deadline.
 Submit papers online at: http://scholarcommons.usf.edu/jss/.
 Please contact: editor@henley-putnam.edu for more information.
 Submission information and links can also be found below.
About the Journal of Strategic Security
The Journal of Strategic Security is a peer-reviewed professional journal published
quarterly by Henley-Putnam University Press. JSS provides a multi-disciplinary forum
for scholarship and discussion of strategic security issues drawing from the fields of
intelligence, terrorism and counterterrorism studies and protection, among others.
The Journal encourages diversity in theoretical foundations, research methods, and
approaches. Quantitative and qualitative studies, for example, each offer valuable
contributions to the field of strategic security. Academic disciplines of anthropology,
criminology, economics, history, international relations, political science, psychology,
and sociology are welcome, as are the applied scholarly fields of security studies,
strategic studies, and intelligence studies.
JSS emphasizes contemporary security issues, so manuscripts focused on non-state
actors are of particular interest. Topics such as counter-terrorism, jihadist ideology,
genocide, global policing, insurgencies, intelligence, inter-state armed conflict, irregular
warfare, radicalization, risk management, terrorism, threat assessment, and violent
extremism are well suited to the Journal, as are contributions on security threats arising
from transnational crime, global climate change, failing states, energy and
environmental security issues, and health crises such as pandemics.
JSS publishes review articles, original empirical research, and analytic/conceptual
works that contribute to a better understanding of security-related threats and ways to
prevent or mitigate their impact. Each article should analyze and include implications
for policy and practice.
Please direct all questions to: editor@henley-putnam.edu.
Who Should Submit?
We welcome submissions from students, practitioners, scholars, and experts from the
intelligence, military, and law enforcement communities, as well as from government,
academia, and the private sector. If you have a proposal for a paper or a completed
manuscript, please submit it for consideration according to the instructions below.
Submission Guidelines:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Articles should be approximately 5,000 words. Occasionally, we print longer pieces (up
to 10,000 words) depending on the context and advanced notification.
Format
All documents should be in Microsoft Word format and submitted though the Journal’s
online manuscript management system: http://scholarcommons.usf.edu/jss/. No
hard copy submissions will be accepted. Submitted articles should be in 11.5 pt. Georgia
font. Please visit our Submission Guidelines for more details:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Annotations
To receive full consideration for publication, all submissions must be carefully
referenced using footnotes that include, if applicable, the URL of online sources.
Authors may be required to re-submit their submissions if they are not in the proper
format. No in-text citations will be accepted.
No bibliography is required; however, all papers should be well-documented with the
supporting references appropriately cited in footnotes that strictly follow the
Submission Guidelines:
http://scholarcommons.usf.edu/jss/submissionguidelines.html
Direct all questions to: editor@henley-putnam.edu
Review Process
All papers deemed suitable and within the Journal’s scope will be sent for peer review.
The author may be asked to make changes as requested by the reviewer and editor
before the work is published. Only original manuscripts not previously published or
under consideration for publication elsewhere will be considered. If accepted for
publication, manuscripts cannot be published elsewhere without written permission
from Henley-Putnam University Press.
About Henley-Putnam University
Henley-Putnam University (HPU) is a leader in the developing field of Strategic
Security. HPU uniquely offers a focused curriculum, advanced degrees, collaboration
across military, law enforcement, and intelligence community boundaries, and real-
world experience from its faculty and founders. The University is nationally accredited
by the Distance Education and Training Council, an accrediting body recognized by the
U.S. Department of Education, to offer bachelors and masters degrees in Intelligence
Management, Terrorism and Counterterrorism Studies, and Strategic Security and
Protection Management, and a professional Doctorate in Strategic Security (DSS). Visit
us online at: http://www.henley-putnam.edu.

More Related Content

What's hot

Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Luna Zeng
 
Populism: Demand and Supply
Populism: Demand and SupplyPopulism: Demand and Supply
Populism: Demand and Supply
Stockholm Institute of Transition Economics
 
Leadership Alexandra.S.N
Leadership Alexandra.S.NLeadership Alexandra.S.N
Leadership Alexandra.S.N
Alexandra NI
 
Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...
Emma Morris
 
Military's social science grants raise alarm
Military's social science grants raise alarmMilitary's social science grants raise alarm
Military's social science grants raise alarm
leopinho12
 
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipGODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
Amélie Godefroidt
 
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing CountriesPoverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Stockholm Institute of Transition Economics
 
GaultGWKWgCdr
GaultGWKWgCdrGaultGWKWgCdr
GaultGWKWgCdr
Graeme Gault
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research Presentation
LillithSolomon
 
LGA Syllabus Spring2003
LGA Syllabus Spring2003LGA Syllabus Spring2003
LGA Syllabus Spring2003
Richard V. Imprescia
 
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
inventionjournals
 
Research proposal
Research proposalResearch proposal
Research proposal
Nazam Bhuiyan
 
Holistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionHolistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC Version
Shoshanna Silverberg
 
Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...
Stockholm Institute of Transition Economics
 
Washington
WashingtonWashington
Washington
41kreal
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
The Free School
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda Robinson
Daniel Ross
 
Beijing Agenda 2016
Beijing Agenda 2016Beijing Agenda 2016
Beijing Agenda 2016
DreaCofield
 
Political Myths of the African Great Lakes Region
Political Myths of the African Great Lakes RegionPolitical Myths of the African Great Lakes Region
Political Myths of the African Great Lakes Region
ijtsrd
 
São Paolo Conference 2017
São Paolo Conference 2017São Paolo Conference 2017
São Paolo Conference 2017
DreaCofield
 

What's hot (20)

Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
Cyber-nationalism and China’s Foreign Policy in A New Era: An Empirical Study...
 
Populism: Demand and Supply
Populism: Demand and SupplyPopulism: Demand and Supply
Populism: Demand and Supply
 
Leadership Alexandra.S.N
Leadership Alexandra.S.NLeadership Alexandra.S.N
Leadership Alexandra.S.N
 
Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...Research into the potential correlation between presidential electoral advert...
Research into the potential correlation between presidential electoral advert...
 
Military's social science grants raise alarm
Military's social science grants raise alarmMilitary's social science grants raise alarm
Military's social science grants raise alarm
 
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenshipGODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
GODEFROIDT AMELIE - THESIS - The structure and impact of citizenship
 
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing CountriesPoverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
Poverty, Exclusion, and Dissent - Support for Regimes in Developing Countries
 
GaultGWKWgCdr
GaultGWKWgCdrGaultGWKWgCdr
GaultGWKWgCdr
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research Presentation
 
LGA Syllabus Spring2003
LGA Syllabus Spring2003LGA Syllabus Spring2003
LGA Syllabus Spring2003
 
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...	U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
U. S. Constitutional Protections under the 1st Amendments, Differences Betwe...
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Holistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC VersionHolistic Thinking & Public Policy PC Version
Holistic Thinking & Public Policy PC Version
 
Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...Religion, Politics, and Development Essays in Development Economics and Polit...
Religion, Politics, and Development Essays in Development Economics and Polit...
 
Washington
WashingtonWashington
Washington
 
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media PhenomenonComet PP Pizzagate - Unproven Trial by Social Media Phenomenon
Comet PP Pizzagate - Unproven Trial by Social Media Phenomenon
 
CFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda RobinsonCFR Report: The Future of Special Operations, by Linda Robinson
CFR Report: The Future of Special Operations, by Linda Robinson
 
Beijing Agenda 2016
Beijing Agenda 2016Beijing Agenda 2016
Beijing Agenda 2016
 
Political Myths of the African Great Lakes Region
Political Myths of the African Great Lakes RegionPolitical Myths of the African Great Lakes Region
Political Myths of the African Great Lakes Region
 
São Paolo Conference 2017
São Paolo Conference 2017São Paolo Conference 2017
São Paolo Conference 2017
 

Similar to Journal of Strategic Security cfp summer 2016

Sex Trafficking Essay.pdf
Sex Trafficking Essay.pdfSex Trafficking Essay.pdf
Sex Trafficking Essay.pdf
Anna May
 
The major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docxThe major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docx
intel-writers.com
 
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleySGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
Hannah Al Ghareeb
 
Sex In The Media Essay.pdf
Sex In The Media Essay.pdfSex In The Media Essay.pdf
Sex In The Media Essay.pdf
Vanessa Henderson
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
freedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
freedma5
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
freedma5
 
3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press
freedma5
 
Problems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfProblems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdf
Amy Cruz
 
Legalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfLegalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdf
Susan Ramos
 
Essay On Gang Violence.pdf
Essay On Gang Violence.pdfEssay On Gang Violence.pdf
Essay On Gang Violence.pdf
Jennifer Smith
 
Illegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdfIllegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdf
Keri Goodman
 
what_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfwhat_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdf
ssuser5300ee
 
Media Censorship Essay.pdf
Media Censorship Essay.pdfMedia Censorship Essay.pdf
Media Censorship Essay.pdf
Erin Byers
 
Essays On Terrorism International.pdf
Essays On Terrorism International.pdfEssays On Terrorism International.pdf
Essays On Terrorism International.pdf
Nikki Wheeler
 
Argumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeArgumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling College
Brenda Gutierrez
 
Running Head Annotated bibliography 1Annotated bibliogr.docx
Running Head Annotated bibliography   1Annotated bibliogr.docxRunning Head Annotated bibliography   1Annotated bibliogr.docx
Running Head Annotated bibliography 1Annotated bibliogr.docx
WilheminaRossi174
 
Human Trafficking Essays.pdf
Human Trafficking Essays.pdfHuman Trafficking Essays.pdf
Human Trafficking Essays.pdf
Andrea Lawson
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health Essay
Elizabeth Lewis
 
Essay On Human Population.pdf
Essay On Human Population.pdfEssay On Human Population.pdf
Essay On Human Population.pdf
Erin Byers
 

Similar to Journal of Strategic Security cfp summer 2016 (20)

Sex Trafficking Essay.pdf
Sex Trafficking Essay.pdfSex Trafficking Essay.pdf
Sex Trafficking Essay.pdf
 
The major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docxThe major politics and society updated 2023 doc 4.docx
The major politics and society updated 2023 doc 4.docx
 
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles RipleySGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
SGS305 Final Research Paper Democracy Research Methods Professor Charles Ripley
 
Sex In The Media Essay.pdf
Sex In The Media Essay.pdfSex In The Media Essay.pdf
Sex In The Media Essay.pdf
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog3 1 public com samizdat sept 7 final for blog
3 1 public com samizdat sept 7 final for blog
 
3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press3 1 public com samizdat sept 7 final for word press
3 1 public com samizdat sept 7 final for word press
 
Problems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdfProblems Of Third World Countries Essay.pdf
Problems Of Third World Countries Essay.pdf
 
Legalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdfLegalize Marijuana Essays.pdf
Legalize Marijuana Essays.pdf
 
Essay On Gang Violence.pdf
Essay On Gang Violence.pdfEssay On Gang Violence.pdf
Essay On Gang Violence.pdf
 
Illegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdfIllegal Immigrants Essay.pdf
Illegal Immigrants Essay.pdf
 
what_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdfwhat_is_political_science_-_2012-2013.pdf
what_is_political_science_-_2012-2013.pdf
 
Media Censorship Essay.pdf
Media Censorship Essay.pdfMedia Censorship Essay.pdf
Media Censorship Essay.pdf
 
Essays On Terrorism International.pdf
Essays On Terrorism International.pdfEssays On Terrorism International.pdf
Essays On Terrorism International.pdf
 
Argumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling CollegeArgumentative Essay On Media. Sterling College
Argumentative Essay On Media. Sterling College
 
Running Head Annotated bibliography 1Annotated bibliogr.docx
Running Head Annotated bibliography   1Annotated bibliogr.docxRunning Head Annotated bibliography   1Annotated bibliogr.docx
Running Head Annotated bibliography 1Annotated bibliogr.docx
 
Human Trafficking Essays.pdf
Human Trafficking Essays.pdfHuman Trafficking Essays.pdf
Human Trafficking Essays.pdf
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health Essay
 
Essay On Human Population.pdf
Essay On Human Population.pdfEssay On Human Population.pdf
Essay On Human Population.pdf
 

Recently uploaded

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 

Recently uploaded (20)

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 

Journal of Strategic Security cfp summer 2016

  • 1. Journal of Strategic Security (JSS) Call for Papers The Strategic Security of Ephemeral Global Identities Guest Editor: Matt Armstrong1 Deadline: March 15, 2016 Submit online: http://scholarcommons.usf.edu/jss/ Email questions: editor@henley-putnam.edu The Journal of Strategic Security (JSS), a publication of Henley-Putnam University, seeks manuscripts for an upcoming special issue on future trends global identities for the Summer 2016 issue, Vol. 9, No. 2, featuring our Guest Editor, Matt Armstrong. Around the globe, burgeoning marketplaces of ideas and loyalties threaten traditional models of both nationalism and governance. Sometimes erroneously labeled a “war of ideas,” these marketplaces are empowered by today’s communication and transportation networks. Today, the networks that facilitate inexpensive information and human flows are permitting a new kind of reach and engagement not possible before. Social media, peer- to-peer communications, websites, encryption technologies, satellite TV, and systems can provide a rich experience personalized to an individual or group. This can be done at little to no cost and without the participation or knowledge of societal and governmental “gatekeepers”—peer groups, institutions, and even family members. On both sides of the transaction, barriers to group membership are increasingly bypassed or 1 Matt Armstrong is an author, advisor, and lecturer on public diplomacy and international media. He sits on several boards, including the Public Diplomacy Council and the Broadcasting Board of Governors, and in 2004, he launched the widely-read public diplomacy blog, www.MountainRunner.us. He is nearly finished with his first book, a work that examines the original purpose and design of U.S. government international media and public diplomacy as it began and evolved from 1917 to 1948.
  • 2. negotiable in the interest of the group. A person no longer needs to be of a certain ethnicity, from a culture, or speak a language to be virtually transported anywhere to find a feeling of belonging and acceptance. Increasingly, these conditions remove, or at least mitigate, pressure to assimilate or conform to local societal, even legal, norms. What has emerged is a marketplace where people may opt-in, or “test drive,” multiple identities at once without needing to commit to one. Connections can be made and maintained online, asynchronously, or in-person. Conversely, a person may opt-out of an identity. She may be curious or disenfranchised and new identities previously difficult, if not impossible, to reach are now available. He may want to reestablish a link to his ancestry or with family that did not migrate. Empathy or political disagreement offer two of many other possible motivations. As the marketplace of ideas manifests as a marketplace of loyalty, the impact on domestic and foreign policies on all kinds of states is real. While expensive shortwave radio reached across borders and affected the loyalty of untold numbers of listeners, the transaction costs of today’s marketplace is nearly zero. Virtually anyone can be a “broadcaster” now and participate in conversations discretely. Barriers to action have also changed. Individuals and groups have an increasing vote in security affairs, from contemplating and executing events of disruption and destruction, to leaking secrets, to recruiting campaigns, to shaping political environments for governments. In other words, the stakes are greater now.  What is the meaning of citizenship, loyalty to the state, accountability of a citizen to the state, and of a state for the actions of its citizens?  Is the relevancy and impact of nationalism and citizenship understood in this new marketplace of ideas, identities, and loyalties?  How does the state react to this marketplace? What do defensive and offensive measures look like to capture or retain “market share”?  Does the marketplace work differently in liberal democracies than in illiberal regimes?  What is the relationship between identity politics domestically and the marketplace of loyalties on a transnational scale?
  • 3. Authors from business, government, and academic sectors are encouraged to submit their research for this issue of the Journal of Strategic Security. We are especially eager to receive papers on these and related topics with an international perspective. The Journal looks forward to reviewing manuscripts beginning on the March 15, 2016 submission deadline.  Submit papers online at: http://scholarcommons.usf.edu/jss/.  Please contact: editor@henley-putnam.edu for more information.  Submission information and links can also be found below. About the Journal of Strategic Security The Journal of Strategic Security is a peer-reviewed professional journal published quarterly by Henley-Putnam University Press. JSS provides a multi-disciplinary forum for scholarship and discussion of strategic security issues drawing from the fields of intelligence, terrorism and counterterrorism studies and protection, among others. The Journal encourages diversity in theoretical foundations, research methods, and approaches. Quantitative and qualitative studies, for example, each offer valuable contributions to the field of strategic security. Academic disciplines of anthropology, criminology, economics, history, international relations, political science, psychology, and sociology are welcome, as are the applied scholarly fields of security studies, strategic studies, and intelligence studies. JSS emphasizes contemporary security issues, so manuscripts focused on non-state actors are of particular interest. Topics such as counter-terrorism, jihadist ideology, genocide, global policing, insurgencies, intelligence, inter-state armed conflict, irregular warfare, radicalization, risk management, terrorism, threat assessment, and violent extremism are well suited to the Journal, as are contributions on security threats arising from transnational crime, global climate change, failing states, energy and environmental security issues, and health crises such as pandemics.
  • 4. JSS publishes review articles, original empirical research, and analytic/conceptual works that contribute to a better understanding of security-related threats and ways to prevent or mitigate their impact. Each article should analyze and include implications for policy and practice. Please direct all questions to: editor@henley-putnam.edu. Who Should Submit? We welcome submissions from students, practitioners, scholars, and experts from the intelligence, military, and law enforcement communities, as well as from government, academia, and the private sector. If you have a proposal for a paper or a completed manuscript, please submit it for consideration according to the instructions below. Submission Guidelines: http://scholarcommons.usf.edu/jss/submissionguidelines.html Articles should be approximately 5,000 words. Occasionally, we print longer pieces (up to 10,000 words) depending on the context and advanced notification. Format All documents should be in Microsoft Word format and submitted though the Journal’s online manuscript management system: http://scholarcommons.usf.edu/jss/. No hard copy submissions will be accepted. Submitted articles should be in 11.5 pt. Georgia font. Please visit our Submission Guidelines for more details: http://scholarcommons.usf.edu/jss/submissionguidelines.html Annotations To receive full consideration for publication, all submissions must be carefully referenced using footnotes that include, if applicable, the URL of online sources.
  • 5. Authors may be required to re-submit their submissions if they are not in the proper format. No in-text citations will be accepted. No bibliography is required; however, all papers should be well-documented with the supporting references appropriately cited in footnotes that strictly follow the Submission Guidelines: http://scholarcommons.usf.edu/jss/submissionguidelines.html Direct all questions to: editor@henley-putnam.edu
  • 6. Review Process All papers deemed suitable and within the Journal’s scope will be sent for peer review. The author may be asked to make changes as requested by the reviewer and editor before the work is published. Only original manuscripts not previously published or under consideration for publication elsewhere will be considered. If accepted for publication, manuscripts cannot be published elsewhere without written permission from Henley-Putnam University Press. About Henley-Putnam University Henley-Putnam University (HPU) is a leader in the developing field of Strategic Security. HPU uniquely offers a focused curriculum, advanced degrees, collaboration across military, law enforcement, and intelligence community boundaries, and real- world experience from its faculty and founders. The University is nationally accredited by the Distance Education and Training Council, an accrediting body recognized by the U.S. Department of Education, to offer bachelors and masters degrees in Intelligence Management, Terrorism and Counterterrorism Studies, and Strategic Security and Protection Management, and a professional Doctorate in Strategic Security (DSS). Visit us online at: http://www.henley-putnam.edu.