Volume: 18 Issue: 43, 12/26/22

Year: 2022

The Journal of Security Strategies is a peer-reviewed international research journal that focuses on security and strategy research and thinking. The journal welcomes articles on comparative, philosophical, and empirical studies and has no preferences about the authors' choices of methodological perspectives. It also encourages scholarly discussions on vital security and strategy concepts and themes.

We accept articles/papers on the subjects of strategy, security, international relations, regional studies, war studies, military history, defence management, intelligence studies, law of war and armed conflict, and military sociology. The publication language of our journal is Turkish. However, we accept papers/articles written in English, German, or French. 


SUBMISSION GUIDELINES
Articles submitted to the Journal of Security Strategies (JSS) shall not be previously published and shall be authentic in a way that it will contribute to literature of the relevant field. Articles, which are descriptive, expect for the stated parameters in the “Publication Ethics and Evaluation Process” or which are repetitive in their field, will not be taken into evaluation. Articles based on presentations submitted in scientific meetings may be accepted for evaluation, provided that they have not been published in the proceedings of the meetings and that the authors inform the editors so.

The ethical principles and publication policy of the Journal of Security Strategies have been prepared in accordance with the guidelines and policies published by the Committee on Publication Ethics (COPE). Detailed information on publication principles, relations with authors and relations with referees can be found under the relevant sections on the website of our journal.
If the articles submitted via https://dergipark.org.tr/en/pub/guvenlikstrtj comply with the formatting principles presented below and is found to eligible in terms of subject/field, they are assigned to (at least two) referees who are experts in the field for review and evaluation. The authors may re-submit their articles, which are rejected by the Publication Committee, after they revise their work in accordance with the reports of reviewers. If the article is considered to be ill-revised, it is rejected and the process is over. If the article is considered to be revised properly, it is taken as a newly submitted article into the reviewing process. The reports of the referees are of advisory nature and the decision to publish is taken by the Editorial Board.

Authors, who send articles in a foreign language to the Journal, are obliged to get their work proof-read by a native speaker academic who is considered as an expert on their field and to provide an evidence of this proof-reading.

Opinions expressed in the articles published in the Journal are the personal scientific evaluations of the authors and are not, in any way, the institutional views or opinions of their own organizations/institutes or of the Atatürk Strategic Studies and Graduate Institute or the Turkish National Defence University.
The authors whose articles have been published in the Journal of Security Strategies are considered as natural peer-reviewers of the Journal and they are obliged to perform a peer-review at least once upon the request of the Editors.

Formatting Principles for Articles

1. The publication language of Journal of Security Strategies is Turkish. However, articles written in English, German, and French may also be published. The texts submitted shall be clear and understandable, and be in line with scientific criteria in terms of language and expression.

2. The article submitted shall have minimum of 6000 words and maximum of 10,000 words including abstract, summary, bibliography, and footnotes. The articles which are below the minimum or above the maximum counts of words are returned to the authors without being evaluated.

3. The articles shall be submitted with the abstract no longer than 200 words and five keywords. The abstract shall include purpose, method, hypothesis/question, and findings of the article and present the conclusion reached in the article shortly. While writing the abstract, the author shall comply to the rule of “one short and two long sentences”. (In the articles written in German or French, abstracts and keywords in Turkish and English shall be added, as well as the abstract and keywords in the original language of the article.) The article shall also have a summary no longer than 750 words at the end of the text. The summary shall include the points and arguments, which are considered to emphasize and the general outline of the article, in addition to the points pointed out in the abstract. In the articles written in Turkish, the aforementioned extensive summary shall be in English. For articles written in English, extensive summary shall be written in Turkish. The articles written in German or France, the extensive summary shall be written in both English and Turkish.

4. Articles submitted to the Journal of Security Strategies shall be written using the program Microsoft Word in 11 font size in the text and 9 font size in the footnotes. Paragraph properties of the text shall be aligned and line spacing of 1.5 line and paragraph properties of the footnotes shall be aligned and line spacing of 1 line. The page numbers shall be at the bottom of the page.

5. Name of the author shall be placed under the title of the article; their title, place of duty and e-mail address shall be indicated in the footnote with (*) in 9 font size. Footnotes for other explanations shall be provided in numbers at the bottom of the page. The article shall have two-level subheadings and these subheadings shall written bold and numbered (except for introduction and conclusion).

6. Citations in the text shall be shown with double quotes (“...”) and citations with more than three lines shall be written as a new paragraph as a inward, singled spaced and aligned paragraph. Citations within citations shall be shown with a single quote (‘...’). The words to be emphasized within the text shall not be written in bold or underlined but shall be written with double quotes (“...”).

7. The citations shall be made according to guidelines presented below. Articles, which do not comply with these guidelines, will be rejected directly.

8. Multiple references for the same publication shall be made by fully complying the guidelines below in the first reference and then by using the surname and the shortened name of the study. For multiple references in subsequent footnotes, the phrase “ibid” shall be used.

9. The citations in the shall be written as follows:

9.1. Books: name and surname of the author, name of the book, (volume number, if any), (translator, if any), publishing house, place of publication, date of publication, and page number shall be given in order in accordance with the following examples.

1 Morris Janowitz, The Professional Soldier: A Social and Political Portrait, Free Press, New York, 1964, p. 210.

2 John J. Mearsheimer and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy, FSG Adult, 1st edition, New York, 2008, p. 92.

3 Mustafa Aydın, Mitat Çelikpala et al., Uluslararası İlişkilerde Çatışmadan Güvenliğe, Bilgi Üniversitesi Yayınları, İstanbul, 2015, p. 79.

4 Janowitz, The Professional Soldier, p. 155.

5 Ibid, p. 156.


9.2.Articles: name and surname of the author, “name of the article” (translator, if any), name of the periodical, date of publication, number and volume, page number of the reference shall be given in order in accordance with the following examples. For the reference to the encyclopedia articles, same rules apply.

Adam Grissom, “The Future of Military Innovation Studies”, Journal of Strategic Studies, 29:5, 2006, p. 910.

Özlem Durgun ve Mustafa Caner Timur, “Savunma Harcamaları ve Ekonomik Büyüme İlişkisi: Türkiye Analizi”, Dumlupınar Üniversitesi Sosyal Bilimler Dergisi, 54, 2017, p. 119.

Lütfi Sürücü, Fehiman Eminer ve Murat Sağbaş, “The Relationship of Defense Expenditures and Economic Growth Examples of Turkey and China (2000-2020)”, Journal of Security Strategies, 18:41, 2022, p. 175.

In the articles with four or more authors, the names are abbreviated after the first author, as “Gültekin Yıldız et al.”.

Chapters/articles in edited books and proceedings books:
Engin Avcı, “Ceza Adalet Sistemi Çerçevesinde Şiddet İçeren Radikalleşmeyle Mücadele: Terörist Rehabilitasyonu ve Yeniden Topluma Kazandırma”, Gökhan Sarı & Cenker Korhan Demir, (ed.), Uluslararası Güvenlik Kongresi, Kuram, Yöntem, Uygulama, Jandarma ve Sahil Güvenlik Akademisi Yayınları, Ankara, 2019, s. 433.

Online articles:
George F. Kennan, “The Sources of Soviet Conduct”, Foreign Affairs Magazine, July 1947,
https://www.foreignaffairs.com/articles/russian-federation/1947-07-01/sources-soviet-conduct, accessed 21.11.2019.

Kaan Kılıç, “Türk Hava Sanayinin Gelişiminde Polonyalıların Etkisi”, https://savasarastirmalari.com/turk-hava-sanayinin-gelisiminde-polonyanin-etkisi/, accessed 21.05.2022.

“War in Ukraine”, www.internetkaynak.com , accessed 10.05.2022.

9.3.Theses/dissertations: no italics shall be used for the titles of the unpublished theses/dissertations. Name and surname of the author, title of the thesis/dissertation, degree of the thesis/dissertation, institution or institute to which it was submitted, place and date, page number shall be given in accordance with the following example.

Tolga Öz, Reverse Logistics and Applications in the Defense Industry, Unpublished Master’s Thesis, Dokuz Eylül Üniversitesi, İzmir, 2007, p.60.

10.Attachments shall be presented at the end of the text and brief information as to the content and source of the document shall be presented at the bottom of it. Tables and figures (including graphics) may be presented within the text of the article as well as in the attachments. If they are to be presented within the text of article, tables, figures, and graphics shall be numbered in their own order (such as Table 1, Figure 2, etc). The number of the table or figure and the introductory title regarding the content of it shall be given at the bottom of the table or figure centered. If citations are made for tables, figures, graphics and pictures, the sources of the citations shall be given with a footnote.

11. Resources shall be sorted alphabetically in a bibliography at the end of the article. Internet sources shall be added at the end of the bibliography. The entries of the bibliography shall be written by putting the surname of the author first (IN CAPITAL LETTERS) and then name of the author; then all the other information of the sources shall be included as done in the references.

REFERENCES SAMPLE:

REFERENCES

Archival Sources (If available)

The referencing rules of the relevant archive should be taken into account.

Published Works
AVCI Engin (2019). “Ceza Adalet Sistemi Çerçevesinde Şiddet İçeren Radikalleşmeyle Mücadele: Terörist Rehabilitasyonu ve Yeniden Topluma Kazandırma”, (ed.) Gökhan Sarı ve Cenker Korhan Demir, Uluslararası Güvenlik Kongresi, Kuram, Yöntem, Uygulama, Jandarma ve Sahil Güvenlik Akademisi Yayınları, Ankara, 429-444.

GRISSOM Adam (2006). “The Future of Military Innovation Studies”, Journal of Strategic Studies, 29:5, 905-934.

KALELİOĞLU Uğur Berk (2022). “Alman Askeri Sosyolojisi: Gelişim, Kurumsallaşma ve Sınırlılıklar”, Journal of Security Strategies, 18: 41, 201-224,

MEARSHEIMER John J. ve WALT Stephen M. (2008). The Israel Lobby and U.S. Foreign Policy, FSG Adult, 1st edition, New York.

ÖZ Tolga (2007). Reverse Logistics and Applications in the Defense Industry, Unpublished Master’s Thesis, Dokuz Eylül Üniversitesi, İzmir.

SCHELLING Thomas C. (2008). Arms and Influence, Yale University Press, Revised edition, New Haven.

YILDIZ Gültekin (ed.) (2017). Osmanlı Askeri Tarihi: Kara, Deniz ve Hava Kuvvetleri 1792 – 1918, Timaş Yayınları, İstanbul.

İNALCIK Halil (2002). “Barbaros’tan İnebahtı (Leponto)’ya Akdeniz”, (ed.) Bülent Arı, Türk Denizcilik Tarihi, T.C. Başbakanlık Denizcilik Müsteşarlığı Yayınları, Ankara, 141-154.

Internet

KENNAN George F. (1947). “The Sources of Soviet Conduct”, Foreign Affairs Magazine, https://www.foreignaffairs.com/articles/russian-federation/1947-07-01/sources-soviet-conduct, accessed 21.11.2019.

KILIÇ Kaan, “Türk Hava Sanayinin Gelişiminde Polonyalıların Etkisi”, https://savasarastirmalari.com/turk-hava-sanayinin-gelisiminde-polonyanin-etkisi/, accessed 21.05.2022.

“War in Ukraine”, www.internetkaynak.com , accessed 10.05.2022.

Ethical Principles and Publication Policy

The Journal of Security Strategies has firmly committed not to accept any action contrary to scientific research and publication ethics. The Journal upholds the highest standards of publication ethics and pays regard to Principles of Transparency and Best Practice in Scholarly Publishing published by the Committee on Publication Ethics (COPE), the Directory of Open Access Journals (DOAJ), the Open Access Scholarly Publishers Association (OASPA), and the World Association of Medical Editors (WAME) on https://publicationethics.org/resources/guidelines-new/principles-transparency-and-best-practice-scholarly-publishing
The authors should check that the articles are in accordance with the aim and scope of the Journal. Only those manuscripts approved by every individual author and that were not published before in or sent to another journal are accepted for evaluation.
Changing an author's name (omission, addition or order) in papers submitted to the Journal requires written permission of all declared authors.
Plagiarism, duplication, fraud authorship/denied authorship, research/data fabrication, salami slicing/salami publication, breaching of copyrights, and prevailing conflict of interest are unethical behaviors. All manuscripts not in accordance with the accepted ethical standards will be removed from publication. This also contains any possible malpractice discovered after the publication.

Plagiarism
Submitted manuscripts that pass preliminary control are scanned for plagiarism using iThenticate software. If plagiarism/self-plagiarism is detected, authors will be informed. Editors may resubmit the manuscript for similarity check at any peer-review or production stage if required. High similarity scores may lead to the rejection of a manuscript before and even after acceptance. Depending on the type of article and the percentage of similarity score taken from each article, the overall similarity score is generally expected to be less than 15 or 20%.

Double Blind Peer-Review
After the plagiarism check, the editors-in-chief evaluate the eligible ones for their originality, methodology, the importance of the subject covered, and compliance with the journal scope. The editor provides a fair double-blind peer review of the submitted articles and hands over the papers matching the formal rules to at least two national/international referees for evaluation and gives the green light for publication upon modification by the authors in accordance with the referees’ comments.

Research Ethics
The journal adheres to the highest standards in research ethics and follows the principles of international research ethics as defined below. The authors are responsible for the compliance of the manuscripts with the ethical rules.
- Principles of integrity, quality and transparency should be sustained in designing the research, reviewing the design and conducting the research.
- The research team and participants should be fully informed about the aim, methods, possible uses and requirements of the research and risks of participation in research.
- The confidentiality of the information provided by the research participants and the confidentiality of the respondents should be ensured. The research should be designed to protect the autonomy and dignity of the participants.
- Research participants should participate in the research voluntarily, not under any coercion.
- Any possible harm to participants must be avoided. The research should be planned in such a way that the participants are not at risk.
- The independence of research must be clear; and any conflict of interest or must be disclosed.
- In experimental studies with human subjects, written informed consent of the participants who decide to participate in the research must be obtained. In the case of children and those under wardship or with confirmed insanity, legal custodian’s assent must be obtained.
- If the study is to be carried out in any institution or organization, approval must be obtained from this institution or organization.
- In studies with human subject, it must be noted in the method’s section of the manuscript that the informed consent of the participants and ethics committee approval from the institution where the study has been conducted have been obtained.

Author's Responsibilities
It is authors’ responsibility to ensure that the article is in accordance with scientific and ethical standards and rules. And authors must ensure that the submitted work is original. They must certify that the manuscript has not previously been published elsewhere or is not currently being considered for publication elsewhere in any language. Applicable copyright laws and conventions must be followed. Copyright material (e.g. tables, figures or extensive quotations) must be reproduced only with appropriate permission and acknowledgment. Any work or words of other authors, contributors, or sources must be appropriately credited and referenced.
All the authors of a submitted manuscript must have a direct scientific and academic contribution to the manuscript. The author(s) of the original research articles is defined as a person who is significantly involved in the “conceptualization and design of the study”, “collecting the data”, “analyzing the data”, “writing the manuscript”, “reviewing the manuscript with a critical perspective” and “planning/conducting the study of the manuscript and/or revising it”. Fundraising, data collection or supervision of the research group are not sufficient roles to be accepted as an author. The author(s) must meet all these criteria described above. The order of names in the author list of an article must be a co-decision and it must be indicated in the Copyright Agreement Form. The individuals who did not meet the authorship criteria but contributed to the study must be in the acknowledgment section. Individuals providing technical support, assisting writing, providing general support, and providing material or financial aid are examples to be indicated in the acknowledgment section.
All authors must disclose all issues concerning financial relationship, conflict of interest, and competing interest that may potentially influence the results of the research or scientific judgment.
When an author discovers a significant error or inaccuracy in his/her own published paper, it is the author’s obligation to promptly cooperate with the Editor to provide retractions or corrections of mistakes.

Responsibility for the Editor and Reviewers
Editor-in-Chief evaluates manuscripts for their scientific content without regard to ethnic origin, gender, sexual orientation, citizenship, religious belief or political philosophy of the authors. He/She provides a fair double-blind peer review of the submitted articles for publication and ensures that all the information related to submitted manuscripts is kept as confidential before publishing.
Editor-in-Chief is responsible for the contents and overall quality of the publication. He/She must publish errata pages or make corrections when needed.
Editor-in-Chief does not allow any conflicts of interest between the authors, editors, and reviewers. Only he has the full authority to assign a reviewer and is responsible for the final decision for publication of the manuscripts in the Journal.
Reviewers must have no conflict of interest with respect to the research, the authors and/or the research funders. Their judgments must be objective.
Reviewers must ensure that all the information related to submitted manuscripts is kept as confidential and must report to the editor if they are aware of copyright infringement and plagiarism on the author’s side.
A reviewer who feels unqualified to review the topic of a manuscript or knows that its prompt review will be impossible should notify the editor and excuse himself from the review process.
The editor informs the reviewers that the manuscripts are confidential information and that this is a privileged interaction. The reviewers and editorial board cannot discuss the manuscripts with other persons. The anonymity of the referees must be ensured. In particular situations, the editor may share the review of one reviewer with other reviewers to clarify a particular point.

Open Access Statement
The journal is an open-access journal and all content is freely available without charge to the user or his/her institution. Except for commercial purposes, users are allowed to read, download, copy, print, search, or link to the full texts of the articles in this journal without asking prior permission from the publisher or the author. This is in accordance with the BOAI definition of open access.
The open-access articles in the journal are licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license.

Article Processing Charge
The National Defence University covers all expenses of the journal. There is no article processing charges or submission fees for any submitted or accepted articles.

Copyright Notice
Authors publishing with the journal retain the copyright to their work licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/ ) and grant the Publisher non-exclusive commercial right to publish the work. CC BY-NC 4.0 license permits unrestricted, non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Correction, Retraction, Expression of Concern
The editor should consider publishing corrections if minor errors that do not affect the results, interpretations, and conclusions of the published paper are detected. The editor should consider retraction if significant errors and/or misconduct that invalidate results and conclusions are detected.
The editor should consider issuing an expression of concern if there is evidence of research or publication misconduct by the authors, there is evidence that the findings are unreliable and institutions of the authors do not investigate the case or the possible investigation seems unfair or nonconclusive.
The guidelines of COPE and ICJME are taken into consideration regarding correction, retractions, or expressions of concern.

Archiving Policy
To guarantee that all papers published in the journal are maintained and permanently accessible, articles are stored in Dergipark which serves as a national archival web site and at the same time permits LOCKSS to collect, preserve, and serve the content.
Additionally, authors are encouraged to self-archive the final PDF version of their articles in open electronic archives that conform to Open Archives Initiative standards (https://www.openarchives.org/). Authors should provide a link from the deposited version to the URL of the journal on the National Defence University website.


There is no submission/publication fee.