NCTN Online Publications Guidelines:
The NCTN presents authoritative information on the latest developments and on current issues, in an accessible style that appeals to researchers and working professionals alike.
The website online publications bring new perspective to the theory and practice of security management, with evaluations of the latest innovations in security technology, and insight on new practices and initiatives. Among the topics covered are new security management techniques, as well as news, analysis and advice regarding current research and op-end articles.
The website online publications cover’s specific types of geopolitical issues such political violence and terrorism, national security, cyber terrorism, terrorist financing, religious radicalization and violent extremism, organized crime with the nexus of terrorism and hybrid terrorism linked to known state and rogue states.
Specialized settings are also discussed, including nuclear safety, aviation, rail transport, maritime piracy, crime in public spaces and events and more. As technology expands, the journal devotes coverage to computer and information security, cybercrime, and data analysis in investigation, prediction and threat assessment. Management topics covered include evaluation of security measures, anti-crime design and planning, staffing, and regulation of the security industry.
The use of this website is subject to the following terms of use:
The content of the pages of this website is for your general information and use only. It is subject to change without notice.
Neither we nor any third parties provide any warranty or guarantee as to the accuracy, timeliness, performance, completeness or suitability of the information and materials found or offered on this website for any particular purpose. You acknowledge that such information and materials may contain inaccuracies or errors and we expressly exclude liability for any such inaccuracies or errors to the fullest extent permitted by law.
Your use of any information or materials on this website is entirely at your own risk, for which we shall not be liable. It shall be your own responsibility to ensure that any products, services or information available through this website meet your specific requirements.
This website contains material which is owned by or licensed to us. This material includes, but is not limited to, the design, layout, look, appearance and graphics. Reproduction is prohibited other than in accordance with the copyright notice, which forms part of these terms and conditions.
All trademarks reproduced in this website, which are not the property of, or licensed to the operator, are acknowledged on the website.
Unauthorized use of this website may give to a claim for damages and/or be a criminal offence.
From time to time this website may also include links to other websites. These links are provided for your convenience to provide further information. They do not signify that we endorse the website(s). We have no responsibility for the content of the linked website(s).
You may not create a link to this website from another website or document without Academic Conferences and Publishing Internationals’ prior written consent.
Your use of this website and any dispute arising out of such use of the website is subject to the laws of Finland and the European Union.
Contact us:
Editor in Chief:
Endrin Raj email.a.raj@iacsp-nctn.org
Associate Editor
: Email: j.peltonen@iacsp-nctn.org
Areas covered
This portal is structured to invite all intellectual works encompassing security studies in the widest sense. The primary requirement for an article to be published on this portal is original, logical, empirical, relevant and theoretically sound analysis. However, innovation remains the central aim of this endeavor. Security studies portal welcomes perspectives from all corners of the world and encourages perspectives from the developing as well as developed world.
Sub themes
The list of subthemes is exhaustive but by no means limited to the abovementioned topics. The final decision based on criteria of innovation, relevance and broad categorization will be taken by the Editor(s).
Submission requirements
Research Articles
Research articles are detailed, original and substantive works in the realm of security studies. Submissions shall be, well-researched first-rate and fully-developed theoretical arguments on an issue related to security studies. The general length of such articles shall be 5,000- 8,000 words (excluding supplementary information, but including footnotes, endnotes, bibliography, and tables) but submissions up to 10,000 words will be considered.
Review articles
Review article shall be Essays of article-length reviews of upcoming scholarship in security studies that make a novel theoretical or empirical point. Review essays range from 3,000-6,000 words (excluding online-only supplementary material) and shall review two or more books as well as related research, with the bulk of the article dedicated to the reviewer’s analysis.
Short essays and commentaries (Insights/OP-END)
Short articles and essays shall be analytical and theoretically based focused on issues of contemporary significance. They shall have a title which is not vague and shall focus on putting out suggestions, opinion and insights for policy makers with logical outcomes expected from those suggestions. They can be sourced and sighted for references. The word limit of such article should be below 2000-4000 words.
Format and styling to be followed:
Data Presentation