Current Issue

Issue: 16, 12/31/22

Year: 2022

E-DATR is a product of the Centre of Excellence-Defence Against Terrorism (COE-DAT). The information and views expressed in this e-journal are solely those of the lecturers and may not represent the opinions and policies of NATO, COE-DAT, NATO member countries or the institutions with which the lecturers are affiliated

E-DATR is a product of the Centre of Excellence-Defence Against Terrorism (COE-DAT). The information and views expressed in this e-journal are solely those of the lecturers and may not represent the opinions and policies of NATO, COE-DAT, NATO member countries or the institutions with which the lecturers are affiliated

PUBLISHING PRINCIPLES
Articles sent to the Defence Against Terrorism Review must not be published elsewhere or must not have been sent to another publication in order to be published. Once the articles are submitted to DATR, the authors must acknowledge that they cannot submit their articles to other publications unless the total rejection of concerned articles by the Editor or the Endorsement Committee (EC).
The authors who try to submit their already published (even electronically) articles to DATR will not be accepted to submit their articles again and will be forbidden to participate any future activity conducted by COE-DAT.

A. GENERAL PRINCIPLES
1. Language of publication is English. The texts submitted must be clear and understandable, and be in line with scientific/academic criteria in terms of language, expression and citation.
2. The texts submitted to be published must be between 4000 and 12000 words including the abstract and bibliography.
3. The texts must be submitted together with an abstract no longer than 300 words at the beginning of the paper and with five keywords after the abstract.
4. The name of the author must be placed in the first footnote, with his/her title, place of duty and e-mail address. Footnotes for other explanations must be provided both in the text and down the page in numbers.
5. The type character must be Arial, “11 type size”, line spacing “1,5 nk”, footnotes in “9 type size” and with “single” line spacing.

General Contents: The following are general stylistic conventions used by COE-DAT:
1. Writing must be scholarly in nature and not overly conversational. Do not use “I” or “we” but “the author” or the “authors.”
2. Do not use contractions except in quotes.
3. Except in quotes, do not underline or bold text to emphasize it but instead use word order for emphasis. To highlight a term, show the key words in single mark (‘aerospace’).
4. Use italic font for foreign phrases and names of court cases.
5. For dates, use – date month year format (10 March 2011) – not numbers (10/03/11). In footnotes, dates of the sources may follow the format used in the source.
6. There should be only one space between the period at the end of a sentence and the beginning of the next sentence.
7. Acronyms should be defined when first used with the full name in parentheses after the acronym; acronyms in foreign languages should have the name in the foreign first in parentheses, followed by the English translation. If an acronym has been defined once in the text of the article, it is unnecessary to spell it out again either in text or footnotes.
8. Numbers less than twenty or less should be spelled out; numbers 21 and above should be left in numbers.
9. Values in currency should be quoted in the actual currency followed by the amount in dollars (USD) or euros (€) in parentheses.
10. While making quotations;
a. If the part taken from the source is 4 lines and less than 4 lines, quotation marks (“...sentence...”) can be used.
b. If the part taken from the source is more than 4 lines, it must be given with extra indentations.
- In addition, the writer of the article must avoid excessive use of each source, in particular from their own previous writings.

B. PRINCIPLES AS TO PAGE LAYOUT
Formatting: Double-spaced with standard page margins. The text and all headings should be left justified. Set language as American English. The publisher employed by COE-DAT uses a particular document formatting that will be applied by the editors.

C. PRINCIPLES AS TO REFERENCES AND CITATIONS
Citations shall be given down the pages in numbers in Defence Against Terrorism Review and references shall not be presented in the text (e.g. Waltz, 2009: 101.).
Full identity of the resources cited shall be given; any resource not actually cite shall not be presented in the bibliography.


Format for footnote citations;
1. For Books
a. Books with Single Author:
Name and surname of the author, name of work (“volume no” if applicable, translator if any, publisher and date of publication), page number(s). For example;
Joseph Needham, Science and Civilization in China, (Vol. 5, Cambridge Univ. Pres, 1954), p.7.
Joseph Needham, Science in Traditional China (Harvard Univ. Pres, 1981), p. 37.
b. Books with Two or Three Authors:
Name and surname of the first author, name and surname of the second author, name and surname of the third author, name of work (“volume no” if applicable, translator if any, publisher and date of publication), page number(s). For instance;
Joseph S. Nye Jr. and David A. Welch, Understanding Global Conflict and Cooperation, (Pearson Publication, 2011), p. 280.
c. Books with More Than Three Authors:
Name and surname of the first author et. al., name of work (“volume no” if applicable, translator if any, publisher and date of publication), page number(s). For example;
Luis Benton et. al., Informal Economy, (The John Hopkins University Press, 1989), pp. 47-59.
d. Books with Name of Author or Editor Non-Specified:
Redefining Security (Praeger Publication, 1998), p. 81.
2. For Articles
Name and surname of the author (for all authors if two or three, if more than three authors just for the first author and et. al.), “name of the article” (translator if any), name of periodical in which it is published, volume number (issue) (publication year), pages in journal, cited page number.
a. Articles with One Author:
Barry Buzan, “New Patterns of Global Security in the Twenty-First Century,” International Affairs 67(3) (1991), pp. 431-451, p. 442.


b. Articles in Compilation Books:
Barry Buzan, “Is International Security Possible?”, in New Thinking About Strategy and International Security (Ken Botth and Don Kaufman, eds, Harper Collins, 1991), pp. 31-55, p. 42.
c. Articles from Daily Newspapers:
Yossi Melman, “Computer Virus in Iran Actually Targeted Larger Nuclear Facility”, Haaretz (22 September 2011), p. 7.
“Tehran’s nuclear ambitions”, The Washington Post (26 September 2009), p. 5.
3. For Theses
No italics shall be used for the titles of non-published theses. Name and surname of the author, “title of the thesis” (whether it has been published and academic degree of the thesis, institution and institute of the thesis, date of the thesis), page number. For instance;
Atasay Özdemir, “Approaches of the Effective Actors of the International System to Iran’s Nuclear Programme” (Unpublished Doctoral Thesis, War College Strategic Researchs Institute, Istanbul, 2013), p. 22.
4. For Reports
a. Report with Author Specified
Tariq Khaitous, “Arab Reactions to a Nuclear Armed Iran” (Washington Institute for Near East Policy, Policy Focus 94, June 2009), p. 14.
b. Report with Author Non-Specified
Albania Country Report (TİKA Publishing, 1995), p. 7.
c. Report prepared by an Institution, Firm or Institute
American Petroleum Institute, “Drilling and Production Practice Proceedings of the Spring Meeting” (Shell Development Company, 1956), p. 42.
d. For Internet Resources
If any of the above resources are available on the Internet, follow the citation above with “available at” with the full http address and the date accessed in paratheses.
e. Web Pages
“The World Factbook-Turkey,” Central Intelligence Agency, available at https://www.cia.gov/library/publications/the-world-factbook/geos/tr.htm (accessed 25 February 2013).
“Dimona: Negev Nuclear Research Center,” Global Security, available at http://www.globalsecurity.org/wmd/world/israel/dimona.htm (accessed 11 January 2010).
“Russia’s National Security Strategy to 2020” (12 May 2009), Rustrans, available at http://rustrans.wikidot.com/russia-s-national-security-strategy-to-2020 (accessed 02 May 2011).
5. Subsequent citations of the same source:
a. If the citation is to the footnote directly before, use “Ibid” – if the page or paragraph changes, you can add the new information, as in “Ibid, p. 48” or “Ibid, para. 68”.
b. If the source is earlier than the previous one, use the author’s last name (if there is one), followed by the name of the article, followed by the new page or paragraphe number. For example;
Buzan, “Is International Security Possible?”, p. 48.

D. PRINCIPLES TO ABIDE BY IN USING OF DOCUMENTS, TABLES, FIGURES AND GRAPHICS
1. Attachments (documents), shall be presented at the end of the text and down below shall be a brief information as to the content of the document and proper citation in line with the relevant criteria.
2. Other attachments (Table, Figure, and Graphics) shall be presented as Additional Table: 1, Additional Graphic: 3 and Additional Figure: 7. If indicators other than the text are too many in number; attachments shall be presented after the References.
a. References to these attachments in the text shall absolutely be made as Additional Table: 1, Additional Graphic: 3 or Additional Figure: 7.
b. If citation has been made for table, figure, graphic or picture, the source shall absolutely be indicated.
3. The names of the tables within the text shall be written on the top of the table and these tables shall be cited in the footnote according the publication type from which it was cited.
4. The names of the figures, graphics and maps within the text shall be written at the bottom of the figures, graphics and maps and these figures, graphics and maps shall be citied in the footnote according the publication type from which it was cited.

E. PRINCIPLES TO ABIDE BY IN BIBLIOGRAPHY
1. Just like giving citations but this time surname of the author shall be at the beginning.
2. Resources shall be sorted alphabetically from A to Z.
3. Page numbers shall not be indicated. 

ETCHICAL RULES
For Authors
To be accepted to the Journal, articles should be unique, convenient to scientific studies and methodologies, and should contribute to current applications and theories. Articles must be written in English The articles should not be published or sent to be published to any domestic or foreign party before. It is not under the Journal’s responsibility to search this issue. Its ethical responsibility is the author’s. The submission of the article is considered to be the commitment of the author in this respect.
The submitted articles that were presented in scientific meetings such as congress, symposium, seminar etc. can be accepted if they have not been published in the related proceedings document and this must be explicitly stated by the article author(s).
If any search, data collection, analysis, research result etc. within the context of the submitted article were used in any published study, it must be stated in both the article and its reference part.
In the event of having more than one author in the article, all authors undertake having equal responsibility and contributing equally to whole process of the article including planning, research, preparing, organizing, drafting, writing and submitting the last version of the article. If the participation rate differs, the authors must submit participation rate declaration.
The submitted articles cannot include fabricated (untrue) information in research, data collection, analysis, research results etc. issues.
The authors must show in their articles that they have not only referred to the sources supporting the idea/result of the article but also the ones supporting the opposing opinions in both the article and reference.
The name, place and date of the meeting must be stated in congress or symposium papers.
The articles sent to the journal are regularly examined against plagiarism. The application named iThenticate is used to prevent plagiarism.
If the submitted article includes any research applied on humans/animals or any personal information to be shared, the author of the article must submit the proper permission documents taken from an authorized Research Ethics Committee. Such articles will not be accepted without a proper permission document. The situations that necessitate Research Ethics Committee approval are as follows: The researches that are carried out with qualitative and quantitative approaches necessitating data gathering by using questionnaire, focus group work, observation, experiment, interview technics; using of humans or animals for experimental or another scientific purposes; clinical researches on humans or animals. Consent form must be submitted in case reports. A permission document signed by the participants whose scale, questionnaire, photos are put in the study must be submitted to the Journal. It is obligatory to abide by the copyright issues.
In the event of finding that a study doesn’t comply with academic and ethical principles, the process is stopped and the study is rejected.
The authors must certainly state “This study was prepared in compliance with the scientific search and publication ethics. There is no content necessitating any permission from Ethical Board or any legal/special permission in this study. We/I, as the author(s) of the article, signed our/my declaration certifying that there was no conflict of interest in our/my article.” in the abstract.
Linking any particular religion, nationality, race or ethnicity to terrorism or extremism only serves to:
*Aid terrorist organizations in the radicalization of individuals stigmatized by these designations,
* Potentially anger communities so labelled, and
* Alienate NATO allies and partners.
* The chapter will refer to terrorist and extremist groups using their self-declared titles in the course. When referring to broader ideology the following categories are suggested:
* Religiously Motivated Terrorism,
* Ethno-Nationalism,
* Left-Wing Terrorism, or
* Right-Wing Terrorism.
* Terms such as “Islamist threat”, “Islamist terrorism”, “Islamist extremists”, “radical Islam(ist)”, “white-supremacist”, “Western Islamophobia” are not included in the course.
For Referees
The referees are the fundamental elements to determine whether the submitted article is scientifically, grammatically, ethically and academically suitable to be published.
The referees must accept only the articles that they are qualified of evaluating according to their academic expertise.
The referees must abide by the rules of double-blind referee system and respect the confidentiality of the process and act accordingly.
The referees can’t share any information in the article with the other parties.
The referees must abide by the principles of impartiality. They must evaluate the article in terms of scientific measures, its contribution to the field, the correctness of its content, its academic and grammatical suitability.
The referees must strongly abstain from using any kind of offensive, humiliating or accusatory statements in their reports.
The referees must use clear and detailed statements about the article. For the article they don’t approve to be published, they must give concrete reasons explaining the missing or faulty points.
The referees must evaluate the authors’ loyalty to the objectivity principles. The referees must feel content that the author does not only refer to the sources that support the argument in the article but also refer to the ones that support the other opinions as well.
The referees must evaluate the article within 10 days. They must inform the Editorial Board as soon as possible if they can’t evaluate. 10. When the referees realize/suspect that there is a conflict of interest in the study, they must inform the editorial board and if necessary reject the article.
For Editors
The editors must accept the articles that will contribute to the field in compliance with the search and ethical rules and text formatting of the Journal.
The editors mustn’t be in any conflict of interest with the accepted/rejected articles.
The editors have the whole responsibility and authority to accept/reject the article.
The Publication Committee, Responsible Editor and Editorial Secretariat are obliged to keep all studies confidential until they are published. They can’t give any details to anyone except the authors.
It is the editor’s responsibility to keep any information of the referees and the authors mutually confidential in compliance with double-blind referee system.
The editors must check the article in terms of plagiarism before the evaluation process and take necessary measures to prevent plagiarism.
It is the editors responsibility to fulfill plagiarism scanning, preevaluation, referee process, editing and publishing process in time and flawlessly.
The editors must comply with the research and ethical rules and academic standards when accepting or rejecting the articles.

ÜCRETSİZ