SUBMISSION GUIDELINES


Articles submitted to the Journal of Security Strategies (JSS) shall not be previously published and shall be authentic in a way that it will contribute to literature of the relevant field. Articles, which are descriptive, expect for the stated parameters in the “Publication Ethics and Evaluation Process” or which are repetitive in their field, will not be taken into evaluation. Articles based on presentations submitted in scientific meetings may be accepted for evaluation, provided that they have not been published in the proceedings of the meetings and that the authors inform the editors so.

The ethical principles and publication policy of the Journal of Security Strategies have been prepared in accordance with the guidelines and policies published by the Committee on Publication Ethics (COPE). Detailed information on publication principles, relations with authors and relations with referees can be found under the relevant sections on the website of our journal.
If the articles submitted via https://dergipark.org.tr/tr/pub/guvenlikstrtj comply with the formatting principles presented below and is found to eligible in terms of subject/field, they are assigned to (at least two) referees who are experts in the field for review and evaluation. The authors may re-submit their articles, which are rejected by the Publication Committee, after they revise their work in accordance with the reports of reviewers. If the article is considered to be ill-revised, it is rejected and the process is over. If the article is considered to be revised properly, it is taken as a newly submitted article into the reviewing process. The reports of the referees are of advisory nature and the decision to publish is taken by the Editorial Board.

Authors, who send articles in a foreign language to the Journal, are obliged to get their work proof-read by a native speaker academic who is considered as an expert on their field and to provide an evidence of this proof-reading.

Opinions expressed in the articles published in the Journal are the personal scientific evaluations of the authors and are not, in any way, the institutional views or opinions of their own organizations/institutes or of the Atatürk Strategic Studies and Graduate Institute or the Turkish National Defence University.
The authors whose articles have been published in the Journal of Security Strategies are considered as natural peer-reviewers of the Journal and they are obliged to perform a peer-review at least once upon the request of the Editors.

Formatting Principles for Articles

1. The publication language of Journal of Security Strategies is Turkish. However, articles written in English, German, and French may also be published. The texts submitted shall be clear and understandable, and be in line with scientific criteria in terms of language and expression.

2.The article submitted shall have minimum of 6000 words and maximum of 10,000 words including abstract, summary, bibliography, and footnotes. The articles which are below the minimum or above the maximum counts of words are returned to the authors without being evaluated.

3. The articles shall be submitted with the abstract no longer than 200 words and five keywords. The abstract shall include purpose, method, hypothesis/question, and findings of the article and present the conclusion reached in the article shortly. While writing the abstract, the author shall comply to the rule of “one short and two long sentences”. (In the articles written in German or French, abstracts and keywords in Turkish and English shall be added, as well as the abstract and keywords in the original language of the article.) The article shall also have a summary no longer than 750 words at the end of the text. The summary shall include the points and arguments, which are considered to emphasize and the general outline of the article, in addition to the points pointed out in the abstract. In the articles written in Turkish, the aforementioned extensive summary shall be in English. For articles written in English, extensive summary shall be written in Turkish. The articles written in German or France, the extensive summary shall be written in both English and Turkish.

4. . Articles submitted to the Journal of Security Strategies shall be written using the program Microsoft Word in 11 font size in the text and 9 font size in the footnotes. Paragraph properties of the text shall be aligned and line spacing of 1.5 line and paragraph properties of the footnotes shall be aligned and line spacing of 1 line. The page numbers shall be at the bottom of the page.

5. Name of the author shall be placed under the title of the article; their title, place of duty and e-mail address shall be indicated in the footnote with (*) in 9 font size. Footnotes for other explanations shall be provided in numbers at the bottom of the page. The article shall have two-level subheadings and these subheadings shall written bold and numbered (except for introduction and conclusion).

6.Citations in the text shall be shown with double quotes (“...”) and citations with more than three lines shall be written as a new paragraph as a inward, singled spaced and aligned paragraph. Citations within citations shall be shown with a single quote (‘...’). The words to be emphasized within the text shall not be written in bold or underlined but shall be written with double quotes (“...”).

7. . The citations shall be made according to guidelines presented below. Articles, which do not comply with these guidelines, will be rejected directly.

8. . Multiple references for the same publication shall be made by fully complying the guidelines below in the first reference and then by using the surname and the shortened name of the study. For multiple references in subsequent footnotes, the phrase “ibid” shall be used.

9. The citations in the shall be written as follows:

9.1. Books:name and surname of the author, name of the book, (volume number, if any), (translator, if any), publishing house, place of publication, date of publication, and page number shall be given in order in accordance with the following examples.

1 Morris Janowitz, The Professional Soldier: A Social and Political Portrait, Free Press, New York, 1964, s. 210.

2 John J. Mearsheimer and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy, FSG Adult, 1st edition, New York, 2008, s. 92.

3 Mustafa Aydın, Mitat Çelikpala et al., Uluslararası İlişkilerde Çatışmadan Güvenliğe, Bilgi Üniversitesi Yayınları, İstanbul, 2015, p. 79.

4 Janowitz, The Professional Soldier, s. 155.

5  Ibid, p. 156.


9.2.Articles: name and surname of the author, “name of the article” (translator, if any), name of the periodical, date of publication, number and volume, page number of the reference shall be given in order in accordance with the following examples. For the reference to the encyclopedia articles, same rules apply.

Adam Grissom, “The Future of Military Innovation Studies”,Journal of Strategic Studies, 29:5, 2006, p. 910.

Özlem Durgun and Mustafa Caner Timur, “Savunma Harcamaları ve Ekonomik Büyüme İlişkisi: Türkiye Analizi”, Dumlupınar Üniversitesi Sosyal Bilimler Dergisi, 54, 2017, p. 119.

Lütfi Sürücü, Fehiman Eminer and Murat Sağbaş, “The Relationship of Defense Expenditures and Economic Growth Examples of Turkey and China (2000-2020)”, Güvenlik Stratejileri Dergisi, 18:41, 2022, p. 175.

In the articles with four or more authors, the names are abbreviated after the first author, as “Gültekin Yıldız et al.”.

Chapters/articles in edited books and proceedings books:
Engin Avcı, “Ceza Adalet Sistemi Çerçevesinde Şiddet İçeren Radikalleşmeyle Mücadele: Terörist Rehabilitasyonu ve Yeniden Topluma Kazandırma”, Gökhan Sarı & Cenker Korhan Demir, (ed.), Uluslararası Güvenlik Kongresi, Kuram, Yöntem, Uygulama, Jandarma ve Sahil Güvenlik Akademisi Yayınları, Ankara, 2019, p. 433.

Online articles:
George F. Kennan, “The Sources of Soviet Conduct”, Foreign Affairs Magazine, July 1947,
https://www.foreignaffairs.com/articles/russian-federation/1947-07-01/sources-soviet-conduct, accessed 21.11.2019.

Kaan Kılıç, “Türk Hava Sanayinin Gelişiminde Polonyalıların Etkisi”, https://savasarastirmalari.com/turk-hava-sanayinin-gelisiminde-polonyanin-etkisi/, accessed 21.05.2022.

“War in Ukraine”, www.internetkaynak.com , accessed 10.05.2022.

9.3.Theses/dissertations, no italics shall be used for the titles of the unpublished theses/dissertations. Name and surname of the author, title of the thesis/dissertation, degree of the thesis/dissertation, institution or institute to which it was submitted, place and date, page number shall be given in accordance with the following example.

Tolga Öz, Reverse Logistics and Applications in the Defense Industry, Unpublished Master’s Thesis, Dokuz Eylül Üniversitesi, İzmir, 2007, p.60.

10.Attachments shall be presented at the end of the text and brief information as to the content and source of the document shall be presented at the bottom of it. Tables and figures (including graphics) may be presented within the text of the article as well as in the attachments. If they are to be presented within the text of article, tables, figures, and graphics shall be numbered in their own order (such as Table 1, Figure 2, etc). The number of the table or figure and the introductory title regarding the content of it shall be given at the bottom of the table or figure centered. If citations are made for tables, figures, graphics and pictures, the sources of the citations shall be given with a footnote.

11. Resources shall be sorted alphabetically in a bibliography at the end of the article. Internet sources shall be added at the end of the bibliography. The entries of the bibliography shall be written by putting the surname of the author first (IN CAPITAL LETTERS) and then name of the author; then all the other information of the sources shall be included as done in the references.

REFERENCES SAMPLE:

REFERENCES

Archival Sources (If available)

The referencing rules of the relevant archive should be taken into account.

Published Works
AVCI Engin (2019). “Ceza Adalet Sistemi Çerçevesinde Şiddet İçeren Radikalleşmeyle Mücadele: Terörist Rehabilitasyonu ve Yeniden Topluma Kazandırma”, (ed.) Gökhan Sarı ve Cenker Korhan Demir, Uluslararası Güvenlik Kongresi, Kuram, Yöntem, Uygulama, Jandarma ve Sahil Güvenlik Akademisi Yayınları, Ankara, 429-444.

GRISSOM Adam (2006). “The Future of Military Innovation Studies”, Journal of Strategic Studies, 29:5, 905-934.

KALELİOĞLU Uğur Berk (2022). “Alman Askeri Sosyolojisi: Gelişim, Kurumsallaşma ve Sınırlılıklar”, Güvenlik Stratejileri Dergisi, 18: 41, 201-224,

MEARSHEIMER John J. and WALT Stephen M. (2008). The Israel Lobby and U.S. Foreign Policy, FSG Adult, 1st edition, New York.

ÖZ Tolga (2007). Reverse Logistics and Applications in the Defense Industry, Unpublished Master’s Thesis, Dokuz Eylül Üniversitesi, İzmir.

SCHELLING Thomas C. (2008). Arms and Influence, Yale University Press, Revised edition, New Haven.

YILDIZ Gültekin (ed.) (2017). Osmanlı Askeri Tarihi: Kara, Deniz ve Hava Kuvvetleri 1792 – 1918, Timaş Yayınları, İstanbul.

İNALCIK Halil (2002). “Barbaros’tan İnebahtı (Leponto)’ya Akdeniz”, (ed.) Bülent Arı, Türk Denizcilik Tarihi, T.C. Başbakanlık Denizcilik Müsteşarlığı Yayınları, Ankara, 141-154.

Internet

KENNAN George F. (1947). “The Sources of Soviet Conduct”, Foreign Affairs Magazine, https://www.foreignaffairs.com/articles/russian-federation/1947-07-01/sources-soviet-conduct, accessed 21.11.2019.

KILIÇ Kaan, “Türk Hava Sanayinin Gelişiminde Polonyalıların Etkisi”, https://savasarastirmalari.com/turk-hava-sanayinin-gelisiminde-polonyanin-etkisi/, accessed 21.05.2022.

“War in Ukraine”, www.internetkaynak.com , accessed 10.05.2022.