Advertisement

Issue Cover

2022 Impact Factor: 5 2023 Google Scholar h5-index: 33 ISSN: 0162-2889 E-ISSN: 1531-4804

International Security , the #2 journal in International Relations based on 2021 impact factor, publishes lucid, well-documented essays on the full range of contemporary security issues. Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging technologies.

International Security has defined the debate on US national security policy and set the agenda for scholarship on international security affairs for more than forty years. The journal values scholarship that challenges the conventional wisdom, examines policy, engages theory, illuminates history, and discovers new trends.

International Security is published by the MIT Press, and sponsored and edited by the Belfer Center for Science and International Affairs, Harvard University.

international security research paper

Steven E. Miller , Editor-in-Chief

Jacqueline L. Hazelton , Executive Editor

Owen R. Coté Jr. , Editor

Amanda Pearson , Deputy Editor

Monica Achen , Publications Coordinator

Impact Measures

#2 in International Relations (Impact Factor: 7.179, 2021 Journal Citation Reports)

#2 in Military Studies (2022 Google Scholar Metrics)

#8 in Law (2021 SCImago Journal & Country Rank)

Discover new developments in:

- The causes and prevention of war - U.S.- China relations - Great power politics - Ethnic conflict and intra-state war - Terrorism and insurgency - Regional security in Africa, Asia, Europe, and Latin America - U.S. foreign and defense policy - International relations theory - Diplomatic and military history - Cybersecurity and defense technology - Political economy, business, and security - Nuclear proliferation

Affiliations

  • Online ISSN 1531-4804
  • Print ISSN 0162-2889

A product of The MIT Press

Mit press direct.

  • About MIT Press Direct

Information

  • Accessibility
  • For Authors
  • For Customers
  • For Librarians
  • Direct to Open
  • Open Access
  • Media Inquiries
  • Rights and Permissions
  • For Advertisers
  • About the MIT Press
  • The MIT Press Reader
  • MIT Press Blog
  • Seasonal Catalogs
  • MIT Press Home
  • Give to the MIT Press
  • Direct Service Desk
  • Terms of Use
  • Privacy Statement
  • Crossref Member
  • COUNTER Member  
  • The MIT Press colophon is registered in the U.S. Patent and Trademark Office

This Feature Is Available To Subscribers Only

Sign In or Create an Account

Publications

Analysis & Opinions

  • News & Announcements
  • Newsletters
  • Policy Briefs & Testimonies
  • Presentations & Speeches
  • Reports & Papers
  • Quarterly Journal: International Security
  • Artificial Intelligence
  • Conflict & Conflict Resolution
  • Coronavirus
  • Economics & Global Affairs
  • Environment & Climate Change
  • International Relations
  • International Security & Defense
  • Nuclear Issues
  • Science & Technology
  • Student Publications
  • War in Ukraine
  • Asia & the Pacific
  • Middle East & North Africa
  • North America
  • South America
  • Infographics & Charts

A messy red white and blue paint design

US-Russian Contention in Cyberspace

The overarching question imparting urgency to this exploration is: Can U.S.-Russian contention in cyberspace cause the two nuclear superpowers to stumble into war? In considering this question we were constantly reminded of recent comments by a prominent U.S. arms control expert: At least as dangerous as the risk of an actual cyberattack, he observed, is cyber operations’ “blurring of the line between peace and war.” Or, as Nye wrote, “in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program’s user.”

A consumer hydrogen fuel pump in Germany

The Geopolitics of Renewable Hydrogen

Renewables are widely perceived as an opportunity to shatter the hegemony of fossil fuel-rich states and democratize the energy landscape. Virtually all countries have access to some renewable energy resources (especially solar and wind power) and could thus substitute foreign supply with local resources. Our research shows, however, that the role countries are likely to assume in decarbonized energy systems will be based not only on their resource endowment but also on their policy choices.

President Joe Biden

What Comes After the Forever Wars

As the United States emerges from the era of so-called forever wars, it should abandon the regime change business for good. Then, Washington must understand why it failed, writes Stephen Walt.

Telling Black Stories screenshot

Telling Black Stories: What We All Can Do

Full event video and after-event thoughts from the panelists.

  • Defense, Emerging Technology, and Strategy
  • Diplomacy and International Politics
  • Environment and Natural Resources

International Security

  • Science, Technology, and Public Policy
  • Africa Futures Project
  • Applied History Project
  • Arctic Initiative
  • Asia-Pacific Initiative
  • Cyber Project
  • Defending Digital Democracy
  • Defense Project
  • Economic Diplomacy Initiative
  • Future of Diplomacy Project
  • Geopolitics of Energy Project
  • Harvard Project on Climate Agreements
  • Homeland Security Project
  • Intelligence Project
  • Korea Project
  • Managing the Atom
  • Middle East Initiative
  • Project on Europe and the Transatlantic Relationship
  • Security and Global Health
  • Technology and Public Purpose
  • US-Russia Initiative to Prevent Nuclear Terrorism

Special Initiatives

  • American Secretaries of State
  • An Economic View of the Environment  
  • Cuban Missile Crisis  
  • Russia Matters
  • Thucydides's Trap

Quarterly Journal

International Security is America's leading peer-reviewed journal of security affairs. It provides sophisticated analyses of contemporary, theoretical, and historical security issues. International Security is edited at Harvard University's Belfer Center for Science and International Affairs and is published by The MIT Press.

Subscribe to Journal

A Message from the Executive Editor of International Security

Jacqueline Hazelton discusses the journal's history, future direction, and submission process at the Duck of Minerva blog .

A Conversation with Jacqueline Hazelton, Executive Editor

Read MIT Press's interview with Jacqueline Hazelton , who was named executive editor in March 2022.  

International Security  in the News

In this photo released by Russian Defense Ministry Press Service on April 20, 2022, a Sarmat intercontinental ballistic missile is launched from Plesetsk in northwestern Russia.

Analysis & Opinions - The MIT Press Reader

Beyond the “Nuclear Umbrella”: Rethinking European Defense After the Russia-Ukraine War

  • Jacqueline L. Hazelton
  • Matthew Evangelista

Protesters burn a portrait of U.S. President Donald Trump during a rally at the U.S. Embassy to mark the Feb. 4, 1899, Filipino-American War, Saturday, Feb. 4, 2017 in Manila, Philippines.

Audio - WBUR

The Jackpod: The Meddler’s Trap

In this May 14, 2020, file photo, employees wearing protective equipment work at a semiconductor production facility for Renesas Electronics during a government organized tour for journalists in Beijing.

Analysis & Opinions - Lawfare

Why the United States Is Losing the Tech War With China

  • Miles M. Evers

In this Dec. 1, 2011, file photo, a U.S. soldier with Apache Company of Task Force 3-66 Armor, out of Grafenwoehr, Germany, stands guard at a police checkpoint at Gulruddin pass in Sar Hawza district of Paktika province, south of Kabul, Afghanistan.

Audio - Modern War Institute

Dealers and Brokers in Proxy Wars: Exploring All Means Available

  • Vladimir Rauta

Visitors tour past military vehicles carrying the Dong Feng 41 and DF-17 ballistic missiles at an exhibition highlighting President Xi Jining and his China's achievements under his leadership, at the Beijing Exhibition Hall in Beijing on Oct. 12, 2022.

Analysis & Opinions - Foreign Affairs

China’s Misunderstood Nuclear Expansion: How U.S. Strategy Is Fueling Beijing’s Growing Arsenal

  • M. Taylor Fravel
  • Henrik Stålhane Hiim
  • Magnus Langset Trøan

German Foreign Minister Annalena Baerbock, right, and her Israeli counterpart Eli Cohen brief the media after a meeting at the foreign ministry in Berlin, Germany, Tuesday, Feb. 28, 2023.

When Forgiveness Is Impossible: How Atonement Works as Policy

  • Kathrin Bachleitner

Driverless trucks move shipping containers at an automated port in Tianjin, China, Monday, Jan. 16, 2023. China's exports fell 7.5% from a year ago in May, 2023, and imports were down 4.5%, adding to signs an economic recovery is slowing.

Analysis & Opinions - The Wall Street Journal

China Relies on U.S., Allies for Hundreds of Products

  • Timothy W. Martin

Commuters wearing face masks walk across an intersection near an electronic billboard for China's armed forces during the morning rush hour in Beijing, Friday, Feb. 10, 2023.

Audio - Center for Strategic & International Studies

How Information Flows Impact Decision Making

Chinese paramilitary police and security officers wear face masks to protect against the spread of the new coronavirus as they stand guard outside an entrance to the Forbidden City in Beijing, Friday, May 1, 2020. The Forbidden City reopened beginning on Friday, China's May Day holiday, to limited visitors after being closed to the public for more than three months during the coronavirus outbreak.

The Bad Advice Plaguing Beijing’s Foreign Policy

In this Aug. 20, 2017 file photo, U.S. Army soldiers stands next to a guided-missile launcher, a few miles from the frontline, in the village of Abu Ghaddur, east of Tal Afar, Iraq. American troops have started to draw down from Iraq following Baghdad’s declaration of victory over the Islamic State group last year, according to western contractors at a U.S.-led coalition base in Iraq.

Why Security Assistance Often Fails

  • Rachel Tecott Metz

Residents wearing face masks walk by tree shadow cast on a Communist Party's logo near a residential area in Beijing, Thursday, March 2, 2023. Chinese leader Xi Jinping's agenda for the annual meeting of the ceremonial legislature: Revive the economy by encouraging consumers to spend more now that severe anti-virus controls have ended, and install a government of loyalists to intensify Communist Party control over the economy and society. (AP Photo/Andy Wong)

Magazine Article - Foreign Affairs

The New China Shock: How Beijing’s Party-State Capitalism is Changing the Global Economy

  • Margaret M. Pearson
  • Meg Rithmire
  • Kellee S. Tsai

Soldiers stand guard after a preparedness enhancement drill simulating the defense against Beijing's military intrusions, ahead of the Lunar New Year in Kaohsiung City, Taiwan on Wednesday, Jan 11, 2023. China renewed its threats Wednesday to attack Taiwan and warned that foreign politicians who interact with the self-governing island are "playing with fire."

The Consequences of Conquest: Why Indo-Pacific Power Hinges on Taiwan

  • Brendan Rittenhouse Green
  • Caitlin Talmadge

U.S. service members, including soldiers from the Army's 101st Airborne Division use computers and prepare to eat inside a tent at at a coalition air base in Qayara, some 50 kilometers south of Mosul, Iraq, Friday, Oct. 28, 2016. The U.S. military says Iraqi forces have retaken 40 villages from the Islamic State group near Mosul since a massive operation to drive the militants from the city began last week. It says Iraqi troops are consolidating gains made east and south of the city earlier this week, but i

Analysis & Opinions - War on the Rocks

There is No Cyber ‘Shock and Awe’: Plausible Threats in the Ukrainian Conflict

  • Lennart Maschmeyer
  • Nadiya Kostyuk

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

3rd Marine Division in Vietnam in 1968

Analysis & Opinions - PRI's The World

The Stuff of Life and Death: Part II

President Joe Biden speaks during an event Monday, March 8, 2021, in the East Room of the White House in Washington

Analysis & Opinions - Just Security

The Illegality of Targeting Civilians by Way of Belligerent Reprisal: Implications for U.S. Nuclear Doctrine

  • Scott D. Sagan
  • Allen S. Weiner

Mohammad Javad Zarif during the Munich Security Conference 2019

Analysis & Opinions - Bulletin of the Atomic Scientists

“Transactional” Nuclear Diplomacy May Provide a Path toward “Grand Bargains” with Iran and North Korea

  • Christopher Lawrence

In this Tuesday, Jan. 7, 2020 file photograph, presumptive Democratic presidential nominee Joe Biden gestures during a foreign policy statement in New York.

Magazine Article - Foreign Policy

Making Peace with Iran and North Korea Could Be Good for U.S. Workers

South Korean army's K-55 self-propelled artillery vehicle is unloaded from a barge during a Combined Joint Logistics Over-the-Shore exercise of U.S. and South Korea Combined Forces Command at the Anmyeon beach in Taean, South Korea, Monday, July 6, 2015. The U.S. and South Korean military joint exercise are held from June 29to July 9.

South Korea, Conventional Capabilities, and the Future of the Korean Peninsula

People's Liberation Army (Navy) frigate PLA(N) Yueyang (FF 575) steams in formation with 42 other ships and submarines during Rim of the Pacific (RIMPAC) Exercise 2014.

Analysis & Opinions - 9DASHLINE

What the Numbers Can (and Can’t) Tell Us about the South China Sea Dispute

  • Andrew Chubb

Soldiers assigned to the New York National Guard's 24th Civil Support Team based at Ft. Hamilton, search for a simulated weapon of mass destruction based on elevated radioactivity levels they found in a warehouse during an exercise in Brooklyn, N.Y., Oct. 22, 2019. The 22 person team made up of Airmen and Soliders of the NYNG respond to incidents of chemical, biological, radiological, nuclear and explosive, and every 18 months have to go through an evaluation where the unit is certified in their mission.

Analysis & Opinions - European Leadership Network

It’s Time to Prohibit Radiological Weapons

  • Sarah Bidgood
  • Samuel Meyer
  • William C. Potter

In this June 3, 2020 file photo members of the District of Columbia Army National Guard stand guard at the Lincoln Memorial in Washington securing the area as protests continue following the death of George Floyd, a who died after being restrained by Minneapolis police officers. An Ohio National Guardsman was removed from policing protests in Washington D.C. after the FBI found he expressed white supremacist ideology online, Gov. Mike DeWine announced in a briefing Friday, June 5, 2020.

The Real Threat to Civilian Control of the Military: The Officer Corps Can No Longer Simply Ignore Politics

  • Risa Brooks

Logo of "Saturday Extra"

Audio - Australian Broadcasting Corporation

The Pick – September

China and the world

Magazine Article - The Economist

Why China Bullies

  • Ketian Zhang

Samuel Huntington at the 2004 World Economic Forum. 

It’s time for the US to rethink Huntington’s philosophy: Part I

President Trump visiting American troops in Afghanistan.

What Can Military and Civilian Leaders Do to Prevent the Military’s Politicization?

Slobodan Milosevic at the ICTY

Do War Crimes Tribunals Actually Deter War Crimes?

  • Jacqueline R. McAllister

Uighur men sit in Kashgar.

Understanding China’s 'Preventive Repression' in Xinjiang

  • Sheena Chestnut Greitens

Seth Lederman, the CEO of Tonix Pharmaceuticals, superimposed over several images of the vaccinia virus.

A biotech firm made a smallpox-like virus on purpose. Nobody seems to care

  • Gregory Koblentz

Separatist fighters in Yemen

Analysis & Opinions - The Washington Post

Armed Rebel Groups Lobby in D.C., Just Like Governments. How Does That Influence U.S. Policy?

  • Reyko Huang

Paramilitary patrol in Xinjiang

Magazine Article - The Diplomat

Sheena Greitens on Understanding China’s Policies in Xinjiang

  • Ankit Panda

National address by President Trump

Trump Just De-escalated in the Middle East. Here’s Why We Shouldn’t Be Surprised.

  • Andrew Payne

Refugees wait to board a UN ship

Sending Refugees Back Makes the World More Dangerous

  • Stephanie Schwartz

Signing of the Nuclear Non-Proliferation Treaty

The Shoals of Ukraine: Where American Illusions and Great-Power Politics Collide

  • Serhii Plokhy
  • M.E. Sarotte

China’s People's Liberation Army members in parade

China’s Nuclear Arsenal Was Strikingly Modest, But That Is Changing

Displaced Syrians wait outside tents.

Now That Trump Has Abandoned the Kurds, Will Other Countries Ever Trust the U.S.?

  • Marina E. Henke

Person holding open book.

Your Interesting Late-Summer Foreign Policy Reads

  • Daniel W. Drezner

South Korean protesters holding signs

Japan and South Korea Are Being Pulled into a Low Level Economic War

  • Henry Farrell
  • Abraham L. Newman

Secretary of State Mike Pompeo and Treasury Secretary Steven Mnuchin at a press conference

Introducing a New Paper on “Weaponized Interdependence”

The oil tanker Stena Impero in an Iranian port

Oil Probably Won’t Cause a War with Iran, but It Certainly Adds Fuel to the Blaze

  • Jeff D. Colgan

The Iranian flag waves outside of the UN building that hosts the International Atomic Energy Agency

Iran’s Nuclear Program Seems to Be Accelerating. Will Saudi Arabia Take a Similar Path?

  • Eliza Gheorghe

Environmental activists wear masks depicting world leaders during the G-20 Summit in Japan

The G-20 Is Discussing the "International Liberal Order." That’s a Bad Place to Start a Debate.

  • Charles L. Glaser

Test of sub-sonic cruise missile

Analysis & Opinions - The Diplomat

Shifting Nuclear Sands in South Asia: Understanding India’s Counterforce Temptations

  • Christopher Clary

Military delegates arrive at the Great Hall of the People before the opening session of China's National People's Congress

Is China’s Cyberespionage a Military Game-Changer?

  • Andrea Gilli
  • Mauro Gilli

Armed drone at military base

The U.S. Drone War in Pakistan Revisited

  • Asfandyar Mir

Aerial view of Shanghai World Financial Center and Jin Mao Tower

Stop Obsessing About China

  • Michael Beckley

Anti-Trump protesters taking a rest in Whitehall during the London march against Trump's immigration ban.

Crisis and Conviction: U.S. Grand Strategy in Trump's Second Term

  • Patrick Porter

A U.S. made AH-1W attack helicopter launches a Hellfire missile Thursday, July 20, 2006, in Ilan, Taiwan. 

China-U.S.-Taiwan Relations are in Choppy Waters. Here’s What’s Going On.

  • Scott L. Kastner

Destruction of the Salaheddin neighborhood in eastern Aleppo, Syria, Jan. 20, 2018.

Why Civil Wars Are Lasting Longer

  • Lise Morjé Howard
  • Alexandra Stark

Yemenis stand amid the rubble of houses destroyed by Saudi-led airstrikes in a village near Sanaa, Yemen.

Analysis & Opinions - Political Violence @ a Glance

How Civil Wars End

Discarded shoes of victims remain outside Al-Rawda Mosque in Bir al-Abd northern Sinai, Egypt. a day after attackers killed hundreds of worshippers, on Saturday, Nov. 25, 2017.

Why Moderate Muslims Come to Support Extremist Groups

  • Barbara Walter

Japan Maritime Self-Defense Force (JMSDF) Oyashio-class submarine Yaeshio (SS-598) arrives at Naval Station Pearl Harbor, September 17, 2009.

Balancing China: How the United States and Its Partners Can Check Chinese Naval Expansion

Taiwan's military displays tanks in a parade in Hsinchu, northern Taiwan, Saturday, July 4, 2015.

Analysis & Opinions - The National Interest

Why China Can't Conquer Taiwan in a War

  • Zachary Keck

North Korea Benefits from Nuclear Weapons. Get Used to It.

North Korea Benefits from Nuclear Weapons. Get Used to It.

  • Mark S. Bell

Hassan Rouhani speaks in a session of parliament

Analysis & Opinions - Woodrow Wilson International Center for Scholars

Avoiding the Translation Trap

  • Ariane Tabatabai
  • Annie Tracy Samuel

Going Stag: How Brideprice Influences Participation in Violent Conflict

Going Stag: How Brideprice Influences Participation in Violent Conflict

  • Valerie M. Hudson
  • Hilary Matfess

The Washington Post

The FARC just became a Colombian political party. Here’s why elections are critical to a lasting peace.

  • Aila M. Matanock

Americans Aren’t as Averse to Using Nuclear Weapons as You Might Think

Magazine Article - The Washington Monthly

Americans Aren’t as Averse to Using Nuclear Weapons as You Might Think

  • Benjamin A. Valentino

Trump says ‘our troops will fight to win’ in Afghanistan. Here’s why peace and stability are so elusive.

  • Geoffrey Swenson

HOW AMERICANS FEEL ABOUT GOING TO (NUCLEAR) WAR

Magazine Article - War on the Rocks

How Americans Feel about Going to (Nuclear) War

  • Christopher Preble

Do bride prices drive terrorism?

Analysis & Opinions - Public Radio International

Do Bride Prices Drive Terrorism?

The Real Nuclear Option

Magazine Article - Slate

The Real Nuclear Option

  • Fred Kaplan

The Trump administration wants regime change in Iran. But regime change usually doesn’t work.

  • Alexander B. Downes
  • Lindsey A. O'Rourke

The Nuclear Taboo Is Weaker Than You Think

Magazine Article - National Review Online

The Nuclear Taboo Is Weaker than You Think

  • Elliot Kaufman

Announcement

Belfer center’s  international security  journal honored for impact.

International Security , the quarterly journal edited at Harvard Kennedy School's Belfer Center for Science and International Affairs and published by The MIT Press, received top rankings for impact in 2019 based on the high number of times the journal's articles were referenced in other publications 

Ash Carter, Director of the Belfer Center, said, “ International Security  has a long history of being a leader in its field. The journal’s mission - to publish and promote insightful analyses of global security issues - is vital to strengthening our understanding of a range of policy challenges.”

Read the full announcement »

International Security  is America’s leading peer-reviewed journal of security affairs. It provides sophisticated analyses of contemporary, theoretical, and historical security issues.  International Security  is edited at Harvard University’s Belfer Center for Science and International Affairs and is published by  The MIT Press .

The growing debate concerning the soundness and direction of international security policies both in the United States and abroad signals a revival of intellectual ferment as well as intuitive uneasiness. Nations are increasingly defining their security not only in the conventional modes of military strength, economic vigor, and governmental stability, but also in terms of capabilities previously less central: energy supplies, science and technology, food, and natural resources. Two hundred years ago, a new state could secure its sovereignty and well-being through an ill-trained militia and a converted merchant fleet. Today, globalization has forced transnation­al concerns—such as trade, terrorism, and the environment—to be essential elements in the security considerations of any prospering society.

We view international security as embracing all factors that have a direct bearing on the structure of the nation-state system and the sovereignty of its members, with particular emphasis on the use, threat, and control of force. Our goal is to provide timely analyses of these issues through contributions that reflect diverse points of view and varied professional experiences. This interdisciplinary journal is offered as a vehicle for communication among scholars, scientists, industrialists, military and government officials, and members of the public who bear a continuing concern for this aspect of international life.

International Security  offers a combination of professional and policy-relevant articles that we believe will contribute to the analysis of par­ticular security problems. For more than thirty years, we have accommodated the broad range of methodologies and perspectives needed to clarify the various positions tendered in the discussion of international security. Our intent is to balance articles of assessment and opinion with those of analysis and research.

This effort is carried forward as a part of the Belfer Center for Science and International Affairs at Harvard University. It is our expectation that research articles, reviews, debates, reports, documentation, and commentary, when made available regularly, will contribute to the disciplined discourse that distinguishes a profession.

To submit a manuscript to  International Security  ( IS ), log on to Editorial Manager, an online submission management system used by more than 6,000 journals. You can access the site at  http://www.editorialmanager.com/isec .

Please register as an author and follow the instructions for submitting a manuscript. If you have any questions or encounter problems, please let us know by clicking “Contact Us” in the main navigation bar.

A length of 10,000 to 15,000 words (including footnotes) is appropriate, but the journal will consider and publish longer manuscripts. Authors of manuscripts with more than 16,000 words should consult the journal’s editors before submission.

  • Delete your name or any references that might identify you from the manuscript.   IS  does not release authors’ names to outside reviewers and, likewise, does not release reviewers’ names to authors.
  • Include a cover letter.
  • Submit your manuscript as a Word document. Do not send a PDF document.
  • For readability, please double-space the text of your submission and use a 12 pt. serif font. Also, please add page numbers.
  • Include a summary of 150 to 200 words.

What Is Appropriate for  IS ?

IS  welcomes submissions on all aspects of security affairs. For perspectives on the scope and research agenda of the field, see  Joseph S. Nye and Sean M. Lynn-Jones, “International Security Studies: A Report on a Conference on the State of the Field,”  International Security , Vol. 12, No. 4 (Spring 1988), pp. 5-27 ; and  Steven E. Miller, “ International Security  at Twenty-five: From One World to Another,”  International Security , Vol. 26, No. 1 (Summer 2001), pp. 5-39 . For additional information on what kinds of manuscripts that  International Security  is looking for, see  Teresa Johnson, “Writing for International Security: A Contributor’s Guide,”  International Security , Vol. 16, No. 2 (Fall 1991), pp. 171-180 . Authors should not, however, limit themselves to the issues and approaches suggested in these articles.

Before submitting a manuscript to  IS  or any other journal, look at  recent issues  to get a sense of the general type of article that the journal publishes. Whenever editors gather to discuss why they reject manuscripts, they agree that the number one reason is that many submissions are inappropriate for their journals.

IS  is not looking for short, undocumented papers that consist primarily of opinion and advocacy. Every year we turn away many submissions that fall into this category. We also rarely consider highly technical articles that are unlikely to be accessible to a broad audience.

We are interested in serious analyses of contemporary security policy issues, theoretical and conceptual issues in security studies, and historical questions related to war and peace. We define “security” broadly to include issues related to the causes, conduct, and consequences of wars. The editors rarely decide to seek articles on a particular topic, although from time to time we may look for articles on topics that have not been addressed in recent issues of the journal.

IS  publishes articles that fall into four broad categories.

Policy . Analyses of contemporary security policy issues.

Theory . Articles that propose, test, refine, or apply theories of international relations that are relevant to the use, threat, and control of force.

History . Articles that offer new information on or interpretations of historical events.

Technology . Analyses of the scientific and technological dimensions of international security.

Of course, these categories overlap to some extent, but we try to strike a balance among them in selecting articles for publication.

In general, manuscripts are more likely to receive serious consideration if they offer one or more of the following:

Originality.  We strongly prefer articles that reach new and interesting conclusions or that offer new information or evidence.

Challenges to the conventional wisdom.  Articles that reiterate well known and popular views are less likely to be published than those that challenge the conventional academic or policy wisdom. As one member of the journal's editorial board put it: “If nobody is going to disagree with an article, there’s no reason to publish it.”

Coverage of important topics.  In general, we prefer articles that address broad topics of major interest. For example, we are more likely to publish an article on the future of U.S.-European relations or the prospects for peace in the twenty-first century than one on civil-military relations in a small country.

Long shelf life.  We prefer articles that are not likely to be overtaken by current events and that will be read with interest for perhaps a decade or more.

Accessibility to a wide audience.  IS  aims to publish articles that can be read by intelligent nonspecialists as well as by academic experts in a particular field.

Of course, not every article in  IS  meets these criteria, but those that do are more likely to receive positive external reviews and favorable consideration by the editors.

Publication Timeline

IS  is published quarterly. Normally, the process of review and publication takes at least eight months; thus, a manuscript submitted in March would ordinarily not appear before the winter issue. Decisions on manuscripts ordinarily take no more than three to four months; the editing and publication process takes between five and six. When authors are asked to revise, the process may take longer.

How Does the Review Process Work?

One or more editors read each manuscript that IS receives. If the manuscript appears suitable for the journal, it is sent to two or three external reviewers.

The review process is doubly blind: the author should remove all identifying references from the manuscript before submission, and we provide anonymous comments to the author when the review is returned. Reviews are only sent to authors when they offer useful and constructive comments.

Manuscripts that receive positive external reviews are circulated to all of the journal’s editors (Steven Miller, Owen Coté, Jacqueline Hazelton, and Amanda Pearson), who then select those that will be published from this short list of leading contenders. We repeat this process for each issue; few articles are accepted and then held over as part of a backlog for publication in a future issue. This policy ensures that we accept only the very best of each group of leading contenders and that we have flexibility to publish articles rapidly.

In some cases, we ask an author to revise and resubmit an article without making a commitment to publish it. We often accept such revised manuscripts, but several are rejected each year. On a case-by-case basis, we decide whether to circulate revised submissions to the external reviewers or only to the journal’s editors.

Policy on Simultaneous Submissions

IS  does not object to simultaneous submission of manuscripts to other publications, but we do ask to be informed if a manuscript is under consideration at another journal. We have adopted this policy because we realize that authors often are under pressure to publish quickly and we often take several months to reach a decision.

Policy on Previous Publication

If a manuscript has been published previously or will appear elsewhere soon, its chances of acceptance by  IS  will probably be reduced. Such issues, however, are handled on a case-by-case basis, taking into account the importance of the topic, the quality of the work, and the attention that it will receive in another publication.

How Often May Authors Publish in IS ?

IS has a policy of not publishing any author more than once a year. We occasionally may make exceptions for coauthored articles. This rule does not apply to correspondence submissions.

Simultaneous Submissions to IS

IS generally prefers only one submission per author at any given time. The editors will occasionally consider simultaneous submissions, but if two or more articles by the same author are accepted, publication of the additional article(s) will be deferred for at least a year.

Correspondence

International Security  welcomes correspondence on articles published in the journal. We cannot publish every letter we receive, but we believe that exchanges between article authors and their critics can be interesting and informative. The journal’s policy is to offer article authors the opportunity to respond to each letter in the issue in which the letter is published. Letters should be no more than 1,000 words long. The journal attempts to publish letters within a year of the publication of the article to which they respond. Letters should be submitted as soon as possible after publication of an article.

Book Review Essays

We solicit most of the book review essays in  IS . If you want to write a book review essay, please contact us and we will let you know if we are interested. We sometimes receive unsolicited book review essays, and they pass through the normal review process.

How to Propose an Article

If you have a manuscript that you would like to submit to  IS  but you are unsure whether it is “right” for the journal,  email us  to ask whether we are interested. Please send a summary of the paper and a description of its length, methods, etc.

Please bear in mind that it is impossible to evaluate manuscripts that we have not seen, but we can tell you whether, for example, we have just accepted another article on the same topic. We can also assess whether the topic and approach are suitable for  IS  and whether the editors might have a particular interest in considering your paper.

International Security  Style Guide

The journal’s style conventions, described below, should be observed if a manuscript is accepted.   Notes must also follow the format described on the following pages. 

The author is responsible for providing images of print-appropriate resolution and appropriate permissions for figures and graphs. Tables need only be legible; they will be typeset.

In general, limit number of citations to three or four of the most important; keep discursive/tangential to an absolute minimum; avoid quotations in notes. If a quote is germane it belongs in the text. Otherwise, cut.

Once a manuscript has been accepted by the journal, the process of editing and publishing is characterized by intense cooperative effort to make each piece the best it can possibly be, despite difficult deadlines. The editors’ suggestions, however energetically argued, are just that (except on matters of basic style and format as noted in this style sheet). An article remains the author’s work, not the journal’s; accordingly, the author has final responsibility for content and presentation.

Authors are responsible for the accuracy of facts and citations. The editors will raise questions and supply information to the best of our ability. The journal does not, however, have the staff to check the accuracy of all quotations, citations, numbers, and facts; this must remain the responsibility of the author.

General Instructions

Summary introductions.

The journal’s goal is to publish cumulative scholarship and to foster debate about the substance of its contents, not about the authors’ intentions. In service of these goals, authors are encouraged to begin articles with a summary introduction that lays out for readers the question being addressed, what the argument is, how it builds on or takes issue with preceding scholarship, what is new about the research or argument, and why it matters. This may be the most important part of your article and the hardest to write. Readers want to know: What questions do you address? Why and how have these questions arisen? What answers will you offer? Do you consult new sources? Do you settle outstanding questions? Mandate rethinking basic issues? Suggest certain policy choices or areas for further research? For examples, see Karl Lautenschläger, “The Submarine in Naval Warfare, 1901–2001,” International Security , Vol. 11, No. 3 (Winter 1986/87), pp. 94–95, https://doi.org/10.2307/2538886 ; and John J. Mearsheimer, “A Strategic Misstep: The Maritime Strategy and Deterrence in Europe,” International Security , Vol. 11, No. 2 (Fall 1986), pp. 3–5, https://doi.org/10.2307/2538957 .

Early in the piece, direct the reader to important previous work. Place your article in context by providing a note or notes that comprise a bibliography of the relevant literature. For examples, see Robert D. Blackwill, “Conceptual Problems of Conventional Arms Control,” International Security , Vol. 12, No. 4 (Spring 1988), p. 40n33, https://doi.org/10.2307/2538993 ; and Barry R. Posen and Stephen Van Evera, “Defense Policy and the Reagan Administration: Departure from Containment,” International Security , Vol. 8, No. 1 (Summer 1983), pp. 6n7, 9n13, https://doi.org/10.2307/2538484 . Feel free to include argument as well as sources in your notes.

See below for a detailed style guide on references.

Ours and Theirs 

The journal is an international publication, so references to "us" and "them" should be avoided in favor of specific reference to "U.S. allies," "the Japanese economy," "NATO budgets," and the like.

American Spelling

However international in content, the journal uses only American spellings (defense, mobilization, armor). British spellings should be retained only in quoted material, titles, and names; otherwise all British spellings (defence, mobilisation, armour) should be converted by the author. For preferred spellings, see  Webster’s Eleventh Collegiate Dictionary . 

The use of headings and subheadings (to the third level) is encouraged, particularly in longer articles, to help the reader follow your argument. Format headings as follows:

  • Level 1 title case, italics, no bold face.
  • Level 2 normal font (no bold face, no italic, no underline), all caps.
  • Level 3 paragraph indent, normal font (no bold face, no italic, no underline), all caps, ends with a period, run in first sentence.

Explanation of Terms

Especially at the outset, it is crucial to be precise in defining key terms, particularly those that will be integral to the discussion throughout. Frequent use of fuzzy concept words should be avoided.

The best IS articles, even those that focus on current issues, will be read for many years. Acronyms, colloquialisms, and terms of art may not be as well known in a decade; please provide explanations accordingly. 

Acknowledgments

Journal policy is to mention the anonymous reviewers if you found the comments helpful, but don’t thank the editorial staff, because we are just doing our jobs. Also, do not mention the number of reviewers.

Supplementary Material

Authors may include an online-only appendix with their article. Materials can be uploaded to the International Security Dataverse ( https://dataverse.harvard.edu/dataverse/isec ) data repository hosted by Harvard University. The appendix will be assigned a DOI and linked to in the published article. Introduce with “see the online appendix at [insert DOI].” Subsequent citations do not need to include the DOI. 

The journal will contact authors during production with instructions for uploading material

Style Preferences

Consult the Chicago Manual of Style , 17th edition, on usage, format, punctuation, and other questions not covered herein.

Abbreviations

Spell out common abbreviations in running text, including “note,” “paragraph,” “i.e.,” and “e.g.” Use abbreviations in parentheses or in a simple citation.

Spell out acronyms where they first appear, including all university names (e.g., Massachusetts Institute of Technology). 

Capitalization

Professional titles should be capitalized when preceding a person’s name and used as part of the name, and lowercased when mentioned after a person’s name or in prose. Military and religious titles follow the same rule. Examples:

  • the president; George Washington, first president of the United States; President Washington; 
  • King Abdullah II; the king of Jordan
  • the chairman; Michael G. Mullen, chairman of the Joint Chiefs of Staff; Admiral Mullen
  • the ayatollah; Ayatollah Khomeini

Exception, named professorships should always be capitalized:

  • Erica Chenoweth, Ph.D. is the Frank Stanton Professor of the First Amendment at Harvard Kennedy School

Emphasis Added

An author wishing to call particular attention to a word or phrase in quoted material may italicize it but must tell readers what has been done, by means of such formulas as “italics mine,” “italics added,” “emphasis added,” or “emphasis mine.” Occasionally it may be important to point out that italics in a quotation were indeed in the original. Here the usual phrase is “italics in the original” or, for example, “De Quincey’s italics.” This information appears either in parentheses following the quotation or in a source note to the quotation. If there are italics in the original of the passage quoted, the information is best enclosed in brackets and placed directly after the added italics.

No bulleted lists. Numbered lists in running text are fine but not indented numbered lists. Style: (1), (2), (3).

Set new terms in quotations, not italics. 

Do not insert a comma in page numbers (e.g., 1000), but do for other numbers in text.

Geographical References

The preferred use is U.S. (adj.) United States (noun) not American/America; Soviet Union, not USSR, but Russia after 1991.

Replace capitals (e.g., Moscow, Washington, Berlin, Paris) with states (Russia/Soviet Union, United States, Germany, Paris) or adj.+ “officials” (e.g., Russian/Soviet officials, U.S. government). After making the change, check to ensure that the subject/verb agreement in the sentence is accurate. (For example, London is nervous = British officials are nervous.)

Notes and References

These examples demonstrate the basic  International Security  note format; when in doubt, check the  Chicago Manual of Style  and provide all bibliographic information in a format that most closely resembles the following.

General Rules for Notes

  • Avoid quotations, extracts, tables, and paragraphing in notes. Do not use “op. cit.” For a note that repeats the citation in the previous note, use “ibid.” followed by the page number. Example: Ibid., 72. Do not use “ibid.” if the preceding note contains more than the one reference.
  • Use two-letter USPS style (CA, MA). State or country should follow if place of publication is ambiguous. Major cities, such as Los Angeles and Baltimore, need no state abbreviation. When the publisher’s name includes the state name, the abbreviation is not needed (e.g., Columbia: University of Missouri Press, 1994).
  • Anglicize foreign place names and retain the standard English version of publisher’s name. Example: Moscow: Gospoltizdat, 1949.
  • Foreign titles should use sentence-style capitalization, followed by translated titles in the same format, enclosed in brackets. Short citations should use the original title, not the translation.
  • “Zhongguo bu shi yi nu jiu shitai de xiangbalao” [China isn’t a bumpkin who in a fit of anger loses control], Huanqiu shibao [Global times], September 16, 2010.
  • Henryk Wereszycki, Koniec sojuszu trzech cesarzy [The end of the Three Emperors’ League] (Warsaw: PWN, 1977).
  • Separate notes in a note string with a semicolon. 
  • Shortened citations should include author’s last name, title of the work cited (usually shortened if more than four words), and page numbers. Example: Morley, Poverty and Inequality , p. 43; and Schwartz, “Nationals and Nationalism,” p. 138.
  • Provide full page number range, that is, pp. 163–167, and use an en dash instead of a hyphen. 
  • Spell out ampersands in book titles and publisher names, but leave in journal titles. 
  • Do not edit quotes for style or grammatical accuracy. 
  • Secretary of Defense Caspar Weinberger, Annual Report to the Congress, Fiscal Year 1984 (Washington, D.C.: Government Printing Office [GPO], 1984), p. 127.
  • Excerpts from Leahy to Hull, May 16, 1944, Foreign Relations of the United States ( FRUS ) , 1945: Conference of Berlin , Vol. 1 (Washington, D.C.: GPO, 1960), p. 265. 
  • Excerpts from Leahy to Hull, May 16, 1944, FRUS, 1945: Conference of Berlin , Vol. 1, p. 262. 
  • International Institute for Strategic Studies (IISS), The Military Balance, 1987–88 (London: IISS, 1987).

Include author’s middle initial, if available. If single note cites multiple works by the same author, spell out author’s full name each time.

  • John J. Mearsheimer, Conventional Deterrence (Ithaca, NY: Cornell University Press, 1983), pp. 163–164. 
  • Kathryn Parker Boudett, Elizabeth A. City, and Richard J. Murnane, eds., Data Wise: A Step-by-Step Guide to Using Assessment Results to Improve Teaching and Learning , rev. ed. (Cambridge, MA: Harvard Education Press, 2013).

Remove the words “The,” “Group,” “Co.,” “Company,” “Publishers,” and “Publishing,” from the names of publishers. 

  • Houghton Mifflin not Houghton Mifflin Co.
  • W. W. Norton not W. W. Norton & Company
  • But: Harvard University Press

Reprint, Revised, and Enlarged Editions

Bernard Brodie and Fawn M. Brodie, From Crossbow to H-Bomb , rev. and enl. ed. (New York: Dell, 1962; Bloomington: Indiana University Press, 1973).

Chapter in a Book

  • Edward N. Luttwak, “The Operational Level of War,” in Steven E. Miller, ed., Conventional Forces and American Defense Policy: An International Security Reader (Princeton, NJ: Princeton University Press, 1986), pp. 211–229.

Volume in a Series

Use Arabic numerals for volumes even if roman in original. Use chap. (chapter) where appropriate.

  • Stephen E. Ambrose, Eisenhower , Vol. 2, The President (New York: Simon and Schuster, 1985), chap. 7.
  • The Complete Tales of Henry James , ed. Leon Edel, Vol. 5, 1883–1884 (London: Rupert Hart-Davis, 1963), pp. 32–33.

Periodicals

Remove “the” from the title of newspapers, magazines, and journals, even if it’s part of the official title, except for non-English titles (e.g., Der Spiegel ).

Journal Articles

Include a digital object identifier (DOI) for all applicable articles. If a DOI isn’t available, use a permalink (also known as a stable URL or persistent URL). Use a slash for a year or month range (e.g.: Fall 2006/07 and April/May 2007).  

  • Michael Beckley, “The Power of Nations: Measuring What Matters,” International Security , Vol. 43, No. 2 (Fall 2018), p. 74, https://doi.org/10.1162/isec_a_00328 .
  • Camilla T.N. Sørensen, “That Is Not Intervention; That Is Interference with Chinese Characteristics: New Concepts, Distinctions, and Approaches Developing in the Chinese Debate and Foreign and Security Policy Practice,” China Quarterly , published ahead of print, March 4, 2019, https://doi.org/10.1017/S0305741018001728 .

Magazines, Newspapers, Press Releases

Titles of magazine and newspaper articles are placed in quotes like titles of journal articles, but articles are usually cited by date only, even if publication is numbered by volume and issue. Include either page numbers or a URL.

  • Gerard C. Smith, “Time is Running Out,” Newsweek , January 31, 1983, p. 8.
  • Steven Lee Meyers, Ellen Barry, and Max Fisher, “How India and China Have Come to the Brink over a Remote Mountain Pass,” New York Times , July 26, 2017, https://www.nytimes.com/2017/07/26/world/asia/dolam-plateau-china-india-bhutan.html .
  • Office of the Press Secretary, “Remarks by President Obama and President Xi of the People’s Republic of China in Joint Press Conference” (Washington, D.C.: White House, September 25, 2015).

Cite web-only press releases as you would a website (see below).

Paper and Reports

Reports, policy briefs, fact sheets, and the like that are published under the imprimatur of an organization should be treated essentially as books.

  • Andrew Chubb, Exploring China’s "Maritime Consciousness": Public Opinion on the South and East China Sea Disputes (Perth, Australia: Perth USAsia Center, 2014).
  • United Nations Mission in Afghanistan (UNMA), Afghanistan Annual Report 2011: Protection of Civilians in Armed Conflict (Kabul: UNMA, February 2012).
  • Stephen T. Hosmer, Operations against Enemy Leaders (Santa Monica, CA.: RAND, 2001).
  • National Security Strategy of the United States of America (Washington, D.C.: White House, December 2017).
  • European External Action Service, A Global Strategy for the European Union’s Foreign and Security Policy (Brussels: European Union, June 2016), p. 8.

Papers in a Series

If the series title is included, it is capitalized headline-style, but it is neither italicized nor put in quotation marks or parentheses. Some series are numbered; many are not. The number (if any) follows the series title with no intervening comma unless vol. or no. is used.

  • Desmond Ball, Targeting for Strategic Deterrence , Adelphi Paper 185 (London: IISS, Summer 1983), p. 1.
  • Omar McDoom, Who Kills? Social Influence, Spatial Opportunity, and Participation in Intergroup Violence , Political Science and Political Economy Working Paper Series (London: London School of Economics, 2011).

Dissertations and Theses

  • Stephen W. Van Evera, “Causes of War” (PhD diss., University of California, Berkeley, 1984), p. 1.
  • Laura McNamara, “Ways of Knowing about Weapons: The Cold War’s End at the Los Alamos National Laboratory” (PhD diss. University of New Mexico, 2001).

Papers Presented at Meetings

  • Benjamin Sims, “The Uninvention of the Nuclear Weapons Complex? A Transactional View of Tacit Knowledge” (paper presented at the annual meeting of the Society for Social Studies of Science, Montreal, Canada, October 11–13, 2007), http://www.sonline.org/ProgramSynopsis060907.pdf .
  • Alexander L. George, “Case Studies and Theory Development” (paper presented at the Second Annual Symposium on Information Processing in Organizations, Carnegie Mellon University, October 15–16, 1982), p. 2.

Unpublished Manuscripts

M. Taylor Fravel, “China’s Military Rise: Assessing Military Capabilities and Political Influence” (unpublished manuscript, 2011). 

Legal and Public Documents

Consult The Bluebook: A Uniform System of Citation published by the Harvard Law Review Association for more extensive examples of citations for legal works. 

Laws and Statutes

“Public laws,” or statutes, are first published as separately as slip bills, then collected in annual volumes of the United States Statutes At Large (abbreviated as “Stat.”) as session laws. Later they are incorporated into the United States Code (U.S.C.).

  • Homeland Security Act of 2002, Pub. L. No. 107-296, 116 Stat. 2135 (2012).

Bills and Resolutions

Congressional bills (proposed laws) and resolutions are published in pamphlet form (slip bills). In citations, bills or resolutions originating in the House of Representatives are abbreviated “H.R.” or “H.R. Res.,” and those originating in the Senate, “S.” or “S. Res.” The title of the bill (if there is one) is followed by the bill number, the number of the Congress, a section number (if relevant), and the year of publication in parentheses.

  • Uyghur Human Rights Policy Act of 2019, S. 178, 116th Cong. 1st sess., September 12, 2019, https://www.congress.gov/bill/116th-congress/senate-bill/178/text?forma… .

Congressional Reports and Testimonies

  • Senate Committee on Foreign Relations, The Mutual Security Act of 1956 , 84th Cong., 2d sess., 1956, S. Rept. 2273, 20.
  • Hearing on H.R. 5005, The Homeland Security Act of 2002, Day 3, before the Select Comm. on Homeland Security, 107th Cong., 2nd sess., July 17, 2002 (statement of David Walker, Comptroller General of the United States), p. 203.

Websites, Blogs, and Social Media

Include as much of the following as can be determined: title or description of the specific page, title or description of the site as a whole, and owner or sponsor of site. Also include a publication date or date of revision or modification. If no such date can be determined, include an access date. If a site ceases to exist before publication or if the information cited has been modified or deleted, this context should be included in the text or note.

  •  “Nuclear Power in the World Today,” World Nuclear Association, February 2018, http://www.world-nuclear.org/info/Current-and-Future-Generation/The-Nuc… .
  • “Sanctions Programs and Country Information,” Office of Foreign Assets Control, U.S. Department of the Treasury, https://home.treasury.gov/policy-issues/financial-sanctions/sanctions-p… , accessed August 11, 2022.

Include “blog” if not in formal title of the publication.

  • Eliza Gheorghe, “Iran’s Nuclear Program Seems to Be Accelerating. Will Saudi Arabia Take a Similar Path?,” Monkey Cage (blog), Washington Post , July 12, 2019, https://www.washingtonpost.com/politics/2019/07/12/irans-nuclear-weapon… .
  • Sewell Chan, “Buzz over Mayor’s ‘Get a Life’ Remark,” Empire Zone (blog), New York Times , June 6, 2007, http://empirezone.blogs.nytimes.com/.&nbsp ;

Social Media

  • Barack Obama (@BarackObama), “Toni Morrison was a national treasure, as good a storyteller, as captivating, in person as she was on the page,” Twitter, August 6, 2019, 8:40 a.m., https://twitter.com/BarackObama/status/1158764847800213507 .

Any third-party data used in an article should be cited, the same as other sources. Include the dataset author(s), dataset name, version number (if any), place of publication, data repository or institution, and a persistent identifier (such as a DOI).

  • Joakim Kreutz, “How and When Armed Conflicts End: Introducing the UCDP Conflict Termination Dataset,” Journal of Peace Research , Vol. 47, No. 2 (2010), pp. 243–250, doi.org/10.1177/0022343309353108.
  • Elizabeth Boschee et al., Integrated Crisis Early Warning System Weekly Event Data, V348, 2018, Harvard Dataverse, https://doi.org/10.7910/DVN/QI2T9A.&nbsp ;
  • Monty G. Marshall, Ted Robert Gurr, and Keith Jagger, Polity IV Project, Center for Systemic Peace, 2014, http://www.systemicpeace.org/inscrdata.html .
  • Eliza Gheorghe, appendix for “Proliferation and the Logic of the Nuclear Market,” V1, March 5, 2019, Harvard Dataverse, https://doi.org/10.7910/DVN/70TJHT.&nbsp ;

Podcasts and YouTube Videos

  • Stanley McChrystal, interview by Thomas Krasnican and Nick Paraiso, “General Stanley McChrystal on Military Leadership and Policymaking,” Thank You for Your Service , podcast, March 5, 2019, https://podcasts.apple.com/us/podcast/general-stanley-mcchrystal/id1441… ;
  • Marina Bay Sands, Singapore, YouTube, April 10, 2018, https://www.youtube.com/watch?vgvS4efEakpY .

Interviews and Speeches

Unpublished interviews.

When there are two or more authors, specify which author did the interview. For interviews conducted remotely, add “phone” before “interview” or use “email correspondence” in place of interview. Location is not needed. For short citations, include the date only if interview is with the same person but on different dates.

  • Author interview with Max G. Manwaring, Carlisle, Pennsylvania, March 11, 2010.
  • Author interview with former Fort Detrick pilot plant shift supervisor, Frederick, Maryland, March 22, 2008.

Published Interviews

  • Robert Gates, “Russian and Chinese Assertiveness Poses New Foreign Policy Challenges,” interview by Fareed Zakaria (Washington, DC: Council on Foreign Relations, May 21, 2014), http://www.cfr.org/defense-and-security/russian-chinese-assertiveness-p… .
  • Bill Keller, executive editor of the New York Times , interview by John Mueller, Berkeley, California, April 9, 2011.
  • Short citation: Keller interview. 

(For short citations, include the date only if the citations include other interviews of the same people but on different dates.)

Citations of speeches should include the author, location, date, and information on where the speech can be read or viewed, if available.

  • Sayyed Hassan Nasrallah, speech at Resistance Culture Conference in Beirut, Al-Manar, May 23, 2006.
  • Ira L. Baldwin, speech given at Fort Detrick Silver Anniversary Luncheon, New York City, New York, May 2, 1967, file 13-II AT, folder 69, American Society for Microbiology Archives, 1–22.
  • The Grugq, “A Short Course in Cyber Warfare,” keynote at Black Hat Asia 2018 conference,
  • A published speech should include a title and the publication where it appears. A video of a speech (e.g., on YouTube) should be cited like other video recordings, including a URL.

Manuscript Collections and Archives

  • For archival material, give the title and the date, followed by all other bibliographical and locating information, in order from most to least specific.  Use the same sequence consistently throughout the work. 
  • For collections consulted online, include a URL or database name.
  • Use quotation marks for specific titles, but not for generic names such as report or minutes .
  • Capitalize generic names if part of a formal heading on a manuscript, and lowercase if merely descriptive.
  • A citation of a letter starts with the name of the letter writer, followed by to , followed by the name of the recipient.
  • Given names may be omitted if identities are clear from context.
  • The word letter can be omitted, but other forms of communication (telegram, memorandum) should be specified.
  • Letters and the like in private collections can be cited like other archival material. Items owned by the author or a private collection can be listed as “in author’s possession” or “private collection,” respectively, and a location can be omitted. 
  • FDR-Ickes, June 23, 1941, folder “Interior-Ickes, Harold L., 1941,” box 55, President’s Secretary’s File, Franklin Delano Roosevelt Library, Hyde Park, New York (henceforth PSF FDRL).
  • Leven C. Allen to Joint Chiefs of Staff, May 26, 1950, and memorandum for the Secretary of Defense, n.d., CCS 383.21 Korea (3-19-45), sec. 21, Records of the United States Joint Chiefs of Staff, Record Group 218, National Archives, Washington, D.C.
  • John F. Kennedy, “Appeasement at Munich,” honors thesis, 1940, box 2, Personal Papers (PP), John Fitzgerald Kennedy Presidential Library (JFKL), Boston, Massachusetts.
  • Presidential Directive/NSC-59, “Nuclear Weapons Employment Policy,” July 25, 1980, National Security Archive, George Washington University, Washington, D.C., https://nsarchive2.gwu.edu/nukevault/ebb390/docs/7-25-80%20PD%2059.pdf .

Address Questions To: Publications Coordinator, International Security   Harvard Kennedy School, Harvard University 79 John F. Kennedy Street, Box 53 Cambridge, MA 02138 Email:  i [email protected]

Preparing a Submission

Manuscripts should be submitted online via Editorial Manager http://www.editorialmanager.com/isec . New users will need to register for an account. Log in as an Author and click  Submit New Manuscript . The submission process allows you to select an article type, upload your files, and enter other information associated with your manuscript.

Item Type Definitions

A cover letter and manuscript file are required. Items will display in the system-built PDF in the order listed.

Cover Letter:  Comments intended for the editor only. This file will not be available to the reviewers.

Manuscript (no author ID information):  The manuscript should be fully anonymized and should be submitted as a Word file (not as PDF). Page numbers should be included.

Supplemental Files (online-only):  Content such as a dataset or additional methodology that is not part of the main text and is intended to appear as an online-only appendix through Harvard’s Dataverse. Any files uploaded as supplemental material must be fully anonymized. If any of the files are Word documents, save duplicate versions and then remove any hidden data and personal information. This can be done in Word 2016 by clicking on File >  Check for Issues > Inspect Document . Select all checkboxes in the following window and click Inspect. When the results display, click Remove All , and save the file.

Figure:  Figures uploaded in source file format, if separate from manuscript.

Table:  Tables uploaded in source file format, if separate from manuscript.

Response to Reviewer Comments:  Point-by-point replies to the individual reviewer and editor comments. This file is available to reviewers and editors and should be fully anonymized.

Additional Material for Reviewers:  Any material for the benefit of reviewers that is not intended to be considered for publication. In the case of revision, you may upload a version of your manuscript highlighting changes from the previous version with this item type.

Uploading a Revision

To submit a revision for an existing manuscript record, authors should click on the Submissions Needing Revision queue and use the Revise Submission action link. Do not include the original cover letter and manuscript in the revised submission. Upload your revised files and proceed through the submission steps.

Avoiding Spam Filters

To ensure that you receive messages sent through Editorial Manager, we recommend that you add [email protected] to the safe/secure senders list in your email client. Entering a second e-mail address (such as a personal account not associated with your university, institution or organization) also decreases the chance that spam filters will trap e-mails sent to you from online systems. In Outlook 2016, you can add a safe sender by clicking on the Home tab > Junk > Junk Email Options… > Safe Senders . 

Volunteering as a Reviewer

If you wish to submit your name as a possible reviewer for an International Security manuscript, you may do so at any time by going to https://www.editorialmanager.com/isec and clicking the Register Now link in the login area. You may select up to five Personal Classifications that will help you be more easily discovered in the database. If you feel that a valuable classification is missing, we would welcome your suggestion. Please also write a short self-introduction to [email protected] .

How do I subscribe to International Security?

All subscriptions are processed through the journal's publisher, MIT Press. You can subscribe or purchase back issues online .

Individual articles can be purchased through the MIT Press  archive  as PDF or ePub files.

You can also  email  the MIT Press’s circulation department or call 617-253-2889.

How can I obtain permission to copy IS articles?

MIT Press  handles all copyright and permissions requests, including requests to copy  IS  articles for classroom use. Please contact the MIT Press subsidiary rights manager at  [email protected] .

I want to change my mailing address. Do I email you?

No. Please contact MIT Press at  [email protected]  with all subscription changes, including updates to your mailing address.

What is the relationship between IS, the Belfer Center, and MIT Press?

The Belfer Center for Science and International Affairs at Harvard University is  IS ’s editorial headquarters. The editorial staff based at the Belfer Center is responsible for selecting and editing articles. In addition to housing  IS , the Belfer Center runs research programs on international security, the environment, technology, and public policy. Belfer Center research fellows often contribute to  IS  while they are in residence, but  IS  is not a “house journal” for the Belfer Center. We welcome and encourage submissions from all authors.

As the journal’s publisher, MIT Press handles the typesetting, printing, and mailing of the journal, as well as advertising, subscription inquiries, and copyright issues.

Why does IS publish articles with large numbers of footnotes?

IS  encourages authors to cite their sources fully and to provide bibliographical footnotes that list references on a particular topic for three reasons.

First, it is standard scholarly practice to provide documentation to indicate the source of information or to credit another writer for having made a particular argument. As a scholarly journal,  IS  makes every effort to follow such practices.

Second, much of the information in the field of international security studies is subject to dispute. Governments have strong incentives to manipulate information. Militaries and intelligence organizations often believe they need to conceal data. By providing citations to the sources of their information,  IS  articles allow readers to judge for themselves whether the information is reliable.

Third, footnotes with numerous citations to other articles and books can help readers to pursue further research on a particular topic.  IS  articles are assigned in many university courses, so we encourage authors to include brief guides to the literature in their footnotes.

What type of article is IS looking for?

Please see our  submission guidelines .

Do I have to be a “big name” to publish in IS?

No. Many authors published in  IS  are prominent in their fields, but the journal publishes articles on the basis of the manuscript's merits, not the author's credentials. Manuscripts are circulated anonymously for external review. Many of the “big names” featured in back issues were graduate students when they first published in  IS . Being a “big name” does not guarantee publication in  IS . Although it would be unfair to reveal their names, we have rejected numerous articles submitted by prominent scholars.

How long should an IS submission be?

Does IS commission or solicit articles?

IS  rarely commissions articles. In some cases, however,  IS  will solicit replies to particularly controversial articles. For example, when  IS  accepted John Mearsheimer's winter 1994/95 article, “The False Promise of International Institutions,” the editors solicited replies that later appeared in the summer 1995 issue. By organizing such sections, we offer authors an opportunity to defend their work and ensure that the exchange appears in a single issue where readers can examine all of the various arguments.

Does IS publish book reviews?

Yes,  IS  does occasionally publish review essays. Most of the book review essays are solicited, but we welcome proposals. Contact us via  email  if you are interested in reviewing a particular book or books.

Who are the external reviewers for IS?

We select qualified reviewers from across the field of international security studies. We rely particularly heavily on members of the  IS  editorial board, authors who have published in the journal, and present and former research fellows at the Belfer Center for Science and International Affairs.

What is the acceptance rate for manuscripts submitted to IS?

The acceptance rate varies from year to year, but it is currently around 5 percent. In most years, we receive 350 to 400 manuscripts and publish 16 to 20 articles.

If I submit an article, do I have to follow the IS style sheet?

No, you can submit a manuscript that conforms to any standard style and citation format. You will need to convert the article to  International Security  style, however, if it is accepted for publication. Please bear in mind that all submissions should be double-spaced, include page numbers, and should not contain any form of identification in the text.

How long does it take for the editors to decide on submissions?

We usually reach a decision in two or three months. When a manuscript is clearly unsuitable for the journal, we often decide much faster. Sometimes, however, it may take longer than three months. In such cases, delays in receiving comments from external reviewers or the fact that the manuscript is one of many strong contenders for publication usually explains the delay.

Does IS object if I simultaneously submit a manuscript to another journal?

No, we have no objections to simultaneous submissions, provided that we are informed. Because we accept only a small proportion of submitted manuscripts and sometimes take several months to decide, we think it is only fair to allow authors the option to submit their work elsewhere.

How long does it take for articles to appear after acceptance?

The lag time between acceptance and publication varies, but it is rarely less than four months. Articles usually appear about eight months after they have been submitted.

Will IS publish articles that have appeared elsewhere?

IS  occasionally publishes articles that will also appear in books or in different form in another publication. All other things being equal, simultaneous or future publication elsewhere will hurt a manuscript’s chances of being accepted at  IS . The editors decide on such manuscripts on a case-by-case basis. Publication in  IS  usually becomes more likely if the manuscript is on an extremely important topic, is of exceptional quality, will not appear elsewhere until long after it has been published in  IS , will be published in an obscure or inaccessible book or periodical, or will appear elsewhere in a significantly different form.

If my article is accepted, do I receive a complimentary copy of the IS issue in which it appears?

Yes, authors of articles each receive three complimentary copies, and authors of correspondence receive one complimentary copy. Additional copies can be ordered from MIT Press .

All subscriptions are processed through the journal's publisher, MIT Press. We offer discounts for students and seniors, and all of our print subscriptions include free online access to the journal.

If you prefer, you can email [email protected] or call the circulation department at 617-253-2889 to place an order. Otherwise, use the online form .

Join Our Email List

Click here  to receive  International Security –related updates. We will notify you via email each time a new issue of  International Security  is published, and will periodically inform you about forthcoming projects, such as additions to the Belfer Center Studies in International Security book series and new  International Security  Readers. We will NOT distribute your information to any other sources.

To learn more about the journal, please read the article by Steven E. Miller, “ International Security  at Twenty-five: From One World to Another,”  International Security , Vol. 26, No. 1 (Summer 2001), pp. 5-39.

Connect With Us

International Security Journal on Facebook

All questions or comments should be directed to:

Publications Coordinator International Security Belfer Center for Science & International Affairs Harvard Kennedy School Harvard University 79 John F. Kennedy Street Cambridge, MA 02138

Telephone: 617-495-1914 Email: [email protected]

Article Awards

Elizabeth m. f. grasmeder / leaning on legionnaires: why modern states recruit foreign soldiers 2022.

Congratulations to Elizabeth M. F. Grasmeder, winner of the American Political Science Association's Catherine McArdle Kelleher Best International Security Article Award. The award seeks to recognize the best peer-reviewed articles in the field of international security and security studies each year. The winning article by Grasmeder, " Leaning on Legionnaires: Why Modern States Recruit Foreign Soldiers ," appeared in the Summer 2021 issue.

Yasuhiro Izumikawa / Network Connections and the Emergence of the Hub-and-Spokes Alliance System in East Asia 2021

Congratulations to Yasuhiro Izumikawa, winner of the Outstanding Article Award in the International History and Politics Section of the American Political Science Association (APSA). The Outstanding Article Award recognizes exceptional peer-reviewed journal articles representing the mission of the International History and Politics Section, including innovative work that brings new light to events and processes in international politics, encourages interdisciplinary conversations between political scientists and historians, and advances historiographical methods. The winning article by Izumikawa, " Network Connections and the Emergence of the Hub-and-Spokes Alliance System in East Asia ," appeared in the Fall 2020 issue. 

Henry Farrell and Abraham L. Newman / Weaponized Interdependence 2020

Congratulations to Henry Farrell and Abraham L. Newman, winner of the ISSS Best Security Article Award from the International Security Studies Section of the International Studies Association. The Best Security Article Award seeks to recognize the best security article published in an academic journal in the prior year. The winning article by Farrell and Newman, " Weaponized Interdependence: How Global Economic Networks Shape State Coercion ," appeared in the Summer 2019 issue. 

Andrea Gilli and Mauro Gilli / Why China Has Not Caught Up Yet 2020

Congratulations to Andrea Gilli and Mauro Gilli, winner of the Best Research Article on U.S. Foreign Policy and Grand Strategy Award from America in the World Consortium. The Best Research Article award seeks to recognize the best peer-reviewed articles in the field of U.S. foreign policy and grand strategy. The winning article by Gilli and Gilli, " Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage ," appeared in the winter 2018/2019 issue. 

Michael Beckley / The Power of Nations 2019

Congratulations to Michael Beckley, winner of the Best Article Award of the International Security (formerly International Security and Arms Control) organized section of the American Political Science Association. The Best Article Award seeks to recognize the best peer-reviewed articles in the field of international security and security studies broadly defined each year. The winning article by Beckley, “ The Power of Nations: Measuring What Matters ,” appeared in the fall 2018 issue.

Christopher Darnton / Archives and Inference: Documentary Evidence in Case Study Research and the Debate over U.S. Entry into World War II 2019

Congratulations to Christopher Darnton, winner of the Outstanding Article Award in International History and Politics. The award seeks to recognizes exceptional peer-reviewed journal articles representing the mission of the International History and Politics section of APSA, including innovative work that brings new light to events and processes in international politics, encourages interdisciplinary conversations between political scientists and historians, and advances historiographical methods. The winning article by Darnton, “ Archives and Inference: Documentary Evidence in Case Study Research and the Debate over U.S. Entry into World War II ,” appeared in the winter 2017/18 issue.

Lise Morjé Howard and Alexandra Stark / How Civil Wars End: The International System, Norms, and the Role of External Actors 2019

Congratulations to Lise Morjé Howard and Alexandra Stark, winners of the Best Security Article Award from the International Security Studies Section (ISSS) of the International Studies Association. The award seeks to recognize an article by an ISA member on any aspect of security studies that excels in originality, significance, and rigor, published in the prior calendar year. Howard and Stark’s winning article, “ How Civil Wars End: The International System, Norms, and the Role of External Actors ,” appeared in the winter 2017/18 issue.

Keir A. Lieber and Daryl G. Press / The New Era of Counterforce 2018

Congratulations to Keir A. Lieber and Daryl G. Press, winners of the Best Article Award of the International Security (formerly International Security and Arms Control) organized section of the American Political Science Association. The Best Article Award seeks to recognize the best peer-reviewed articles in the field of international security and security studies broadly defined each year. The winning article by Lieber and Press, “ The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence ,” appeared in the spring 2017 issue.

Aisha Ahmad / The Security Bazaar 2017

Congratulations to Aisha Ahmad, inaugural winner of the Best Security Article Award from the International Security Studies Section (ISSS) of the International Studies Association. The award is meant to recognize an article by an ISA member on any aspect of security studies that excels in originality, significance, and rigor, published in the prior calendar year. Ahmad's winning article, “ The Security Bazaar: Business Interests and Islamist Power in Civil War Somalia, ” appeared in the winter 2014/15 issue. Watch the Belfer Center's Author Chat with Aisha Ahmad about her article.

Joshua R. Itzkowitz Shifrinson / Deal or No Deal? 2017

Congratulations to Joshua R. Itzkowitz Shifrinson, winner of the DPLST Article Award from the Diplomatic Studies Section of the International Studies Association. This annual award recognizes the article that best advances the theoretical and empirical study of diplomacy—particularly articles that attempt to connect the study of diplomacy with broader issues and trends in the discipline. Shifrinson's winning article, " Deal or No Deal? The End of the Cold War and the U.S. Offer to Limit NATO Expansion " (Spring 2016), is freely available. Check out the Belfer Center's announcement for additional details and view their Author Chat with Mr. Shifrinson.

Michael Beckley / The Myth of Entangling Alliances 2016

Michael Beckley's " The Myth of Entangling Alliances: Reassessing the Security Risks of U.S. Defense Pacts " ( International Security , Spring 2015) received an Honorable Mention in the 2016 competition for the Outstanding Article Award presented by the International History and Politics Section of the American Political Science Association (APSA). View the Belfer Center's Author Chat with Mr. Beckley for a discussion of the article.

Mark S. Bell / Beyond Emboldenment 2016

Congratulations to Mark S. Bell , whose article “ Beyond Emboldenment: How Acquiring Nuclear Weapons Can Change Foreign Policy ,” ( International Security , Summer 2015) has won the 2016 Patricia Weitsman Award for Outstanding International Security Studies Section Graduate Paper. The award will be presented at the 2016 International Studies Association Annual Convention in Atlanta, GA.

The Patricia Weitsman Award for Outstanding International Security Studies Section Graduate Paper recognizes the best graduate student paper on any aspect of security studies. The paper must have been given at the International Studies Annual Convention or the annual International Security Studies Section/International Security and Arms Control Conference.

In announcing Bell’s award, the Weitsman Award Committee praised his article:

Mark Bell’s paper, “Beyond Emboldenment: The Effects of Nuclear Weapons on State Foreign Policy,” proffers a new a typology that innovatively delineates the ways in which the acquisition of nuclear weapons can alter the foreign policy behavior of current and future nuclear states. He then demonstrates the utility of his argument by examining the “hard” case of Britain’s acquisition of nuclear weapons in the mid-1950s. This piece, which has since been published in the journal International Security, should help frame and inform how both scholars and policymakers think about the effects of the acquisition of nuclear weapons on state behavior.

Mark is a Ph.D. candidate in the Department of Political Science at the Massachusetts Institute of Technology and a research fellow at the Belfer Center for Science and International Affairs at the John F. Kennedy School of Government at Harvard University. Listen to the Belfer Center's Author Chat podcast with Mr. Bell for a discussion on this article.

Keren Yarhi-Milo / In the Eye of the Beholder 2014

Congratulations to Keren Yarhi-Milo, whose article “In the Eye of the Beholder: How Leaders and Intelligence Communities Assess the Intentions of Adversaries,” ( International Security , Summer 2013) has won the 2014 Outstanding Article Award from the International History and Politics Section of the American Political Science Association (APSA).

Article Reviews

Winter 2022/23.

Reid B. C. Pauly and Rose McDermott, "The Psychology of Nuclear Brinkmanship," International Security, Vol. 47, No. 3 (Winter 2022/23), pp.  9–51, https://doi.org/10.1162/isec_a_00451.

Roundtable Participants: Jacques E. C. Hymans, Reid B. C. Pauly, Rose McDermott, Marika Landau-Wells, Joshua Rovner, and Janice Gross Stein

Summer 2021

Daniel Byman, "White Supremacy, Terrorism, and the Failure of Reconstruction in the United States," International Security , Vol. 46, No. 1 (Summer 2021), pp. 53–103,  https://doi.org/10.1162/isec_a_00410 .

Spring 2020

Arman Grigoryan,  “Selective Wilsonianism: Material Interests and the West’s Support for Democracy,”  International Security , Vol. 44, No. 4 (Spring 2020), pp. 158–200, doi.org/10.1162/isec_a_00378.

Reviewer: Benjamin Denison

Iain D. Henry, “What Allies Want: Reconsidering Loyalty, Reliability, and Alliance Interdependence,” International Security , Vol . 44, No. 4 (Spring 2020), pp. 45–83, doi.org/10.1162/isec_a_00375.

Reviewer: Luis Simón

Winter 2019/20

Andrew Payne, “Presidents, Politics, and Military Strategy: Electoral Constraints during the Iraq War,” International Security , Vol. 44, No. 3 (Winter 2019/20), pp. 163–203, doi.org/10.1162/ISEC_a_00371.

Reviewer: Benjamin O. Fordham

Brendan Rittenhouse Green and Austin Long, “Conceal or Reveal? Managing Clandestine Military Capabilities in Peacetime Competition,” International Security , Vol. 44, No. 3 (Winter 2019/20), pp. 48–83, doi.org/10.1162/isec_a_00367.

Reviewer: James Holmes

Sheena Chestnut Greitens, Myunghee Lee, and Emir Yazici,  “Counterterrorism and Preventive Repression: China’s Changing Strategy in Xinjiang,”   International Security , Vol. 44, No. 3 (Winter 2019/20), pp. 9 – 47, doi.org/10.1162/ISEC_a_00368.

Reviewer: Jérôme Doyon

Fiona S. Cunningham and M. Taylor Fravel, “Dangerous Confidence?  Chinese Views on Nuclear Escalation,”  International Security , Vol. 44, No. 2 (Fall 2019), pp. 61 – 109,   doi.org/10.1162/isec_a_00359.

Reviewer: Andrew W. Reddie

Summer 2019

Ketian Zhang, “Cautious Bully: Reputation, Resolve, and Beijing’s Use of Coercion in the South China Sea,” International Security, Vol. 44, No. 1 (Summer 2019), pp. 117 – 159, doi.org/10.1162/ISEC_a_00354 .

Reviewer: Audrye Wong

M.E. Sarotte, “How to Enlarge NATO: The Debate inside the Clinton Administration, 1993–95,” International Security , Vol. 44, No. 1 (Summer 2019), pp. 7–41, doi.org/10.1162/isec_a_00353.

Reviewer: Joe Burton

Spring 2019

Eliza Gheorghe,  “Proliferation and the Logic of the Nuclear Market,” International Security, Vol. 43, No. 4 (Spring 2019), pp. 88 – 127, doi.org/10.1162/isec_a_00344. 

Reviewer: Bryan R. Early

Winter 2018/19

Deborah Jordan Brooks, Stephen G. Brooks, Brian D. Greenhill, and Mark L. Haas,  “The Demographic Transition Theory of War: Why Young Societies Are Conflict Prone and Old Societies Are the Most Peaceful,”   International Security , Vol. 43, No. 3 (Winter 2018/19), pp. 53 – 95 , doi.org/10.1162/ISEC_a_00335 .

Reviewer: Richard Cincotta

Christopher Clary and Vipin Narang,  “India’s Counterforce Temptations:  Strategic Dilemmas, Doctrine, and Capabilities.”  International Security Vol. 43, No. 3 (Winter 2018/19), pp.  7 – 52, doi.org/10.1162/isec_a_00340 .

Reviewer: Mahesh Shankar

Michael Beckley, “The Power of Nations: Measuring What Matters,”  International Security , Vol. 43, No. 2 (Fall 2018), pp. 7 – 44, doi.org/10.1162/isec_a_00328.

Reviewer: Robert J. Reardon

Oriana Skylar Mastro, “Conflict and Chaos on the Korean Peninsula: Can China’s Military Help Secure North Korea’s Nuclear Weapons,”   International Security , Vol. 43, No. 2 (Fall 2018), pp. 84–116, doi.org/10.1162/isec_a_00330.

Reviewer: Terence Roehrig

Matthew Adam Kocher, Adria K. Lawrence, and Nuno P. Monteiro, “Nationalism, Collaboration, and Resistance: France under Nazi Occupation,”   International Security,  Vol. 43, No. 2 (Fall 2018), pp.  117–150, doi.org/10.1162/ISEC_a_00329.

Reviewer: Peter Liberman

Reid B.C. Pauly, “Would U.S. Leaders Push the Button? Wargames and the Sources of Nuclear Restraint,”  International Security , Vol. 43, No. 2 (Fall 2018), pp. 151–192, doi.org/10.1162/isec_a_00333.

Reviewer:  Jan Ludvik

Summer 2018

James M. Acton, “Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of Inadvertent Nuclear War,”  International Security , Vol. 43, No. 1 (Summer 2018), pp. 56–99, doi.org/10.1162/isec_a_00320.

Reviewer: Vincent A. Manzo

Spring 2018

Aqil Shah, “Do U.S. Drone Strikes Cause Blowback? Evidence from Pakistan and Beyond,”  International Security , Vol. 42, No. 4 (Spring 2018), pp. 47–84, doi.org/10.1162/isec_a_00312.

Reviewer: Ashan I. Butt

David Shambaugh, “U.S.-China Rivalry in Southeast Asia: Power Shift or Competitive Coexistence?”  International Security , Vol. 42, No. 4 (Spring 2018), pp. 85–127, doi:10.1162/isec_a_00314.

Eric Heginbotham and Richard J. Samuels, “Active Denial: Redesigning Japan’s Response to China’s Military Challenge,”  International Security , Vol. 42, No. 4 (Spring 2018), pp.128–169, doi:10.1162/isec_a_00313.

Jennifer Lind and Daryl G. Press, “Markets or Mercantilism? How China Secures Its Energy Supplies,”  International Security , Vol. 42, No. 4 (Spring 2018), pp. 170–204, doi:10.1162/isec_a_00310.

All reviewed by Priscilla Roberts

Barbara F. Walter, “The Extremist’s Advantage in Civil Wars,” International Security , Vol. 42, No. 2 (Fall 2017), pp.  7–39, doi:10.1162/ISEC_a_00292.

Reviewer: Daniel Krcmaric

Amanda J. Rothschild, "Rousing a Response:  When the United States Changes Policy toward Mass Killing," International Security , Vol. 42, No. 2 (Fall 2017), pp. 120–154, doi:10.1162/ISEC_a_00295.

Reviewer: Debbie Sharnak

Summer 2017

Jacqueline L. Hazelton, "The 'Hearts and Minds' Fallacy: Violence, Coercion, and Success in Counterinsurgency Warfare," International Security, Vol. 42, No. 1 (Summer 2017), pp. 80–113.

Reviewers: David H. Ucko and Jason E. Fritz

Reply by Jacqueline L. Hazelton

Reply by Huw Bennett

Spring 2017

Caitlin Talmadge, "Would China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Conventional War with the United States,"  International Security , Vol. 41, No. 2 (Spring 2017), pp. 50–92.

Reviewer: Nicola Leveringhaus

Winter 2016/17

Rebecca Slayton, "What Is the Cyber Offense-Defense Balance?  Conceptions, Causes, and Assessment,"  International Security , Vol. 41, No. 3 (Winter 2016/17), pp. 72–109.

Joseph S. Nye Jr., "Deterrence and Dissuasion in Cyberspace,"  International Security , Vol. 41, No. 3 (Winter 2016/17), pp. 44–71.

Reviewer: Brandon Valeriano

Reply by Rebecca Slayton.

Alexander B. Downes and Lindsey A. O’Rourke, "You Can’t Always Get What You Want: Why Foreign Imposed Regime Change Seldom Improves Interstate Relations," International Security, Vol. 41, No. 2 (Fall 2016), pp. 43–89.

Keren Yarhi-Milo, Alexander Lanoszka, and Zack Cooper, "To Arm or to Ally? The Patron’s Dilemma and the Strategic Logic of Arms Transfers and Alliances,"   International Security , Vol. 41, No. 2 (Fall 2016), pp.  90–139.

Reviewer: Michael McKoy

Summer 2016

Stephen Biddle and Ivan Oelrich, "Future Warfare in the Western Pacific: Chinese Antiaccess/Area Denial, U.S. AirSea Battle, and Command of the Commons in East Asia," International Security , Vol. 41, No. 1 (Summer 2016), pp. 7–48.

Charles L. Glaser and Steve Fetter, "Should the United States Reject MAD? Damage Limitation and U.S. Nuclear Strategy toward China," International Security , Vol. 41, No. 1 (Summer 2016), pp. 49–98.

Both reviewed by James J. Wirtz

Walter C. Ladwig III, "Influencing Clients in Counterinsurgency: U.S. Involvement in El Salvador’s Civil War, 1979–1992,"  International Security , Vol. 41, No. 1 (Summer 2016), pp. 99–146.

Reviewer: David H. Ucko

Daniel Bessner and Nicolas Guilhot, "How Realism Waltzed Off: Liberalism and Decisionmaking in Kenneth Waltz's Neorealism,"  International Security , Vol. 40, No. 2 (Fall 2015), pp. 87–118.

Reviewers: Stephen Walt, Campbell Craig, William Inboden, Robert Jervis, and Robert Vitalis

Summer 2015

Francis Gavin, "Strategies of Inhibition: U.S. Grand Strategy, the Nuclear Revolution, and Nonproliferation,"  International Security , Vol. 40, No. 1 (Summer 2015), pp. 9–46.

Or Rabinowitz and Nicholas L. Miller, "Keeping the Bombs in the Basement: U.S. Nonproliferation Policy toward Israel, South Africa, and Pakistan,"  International Security , Vol. 40, No. 1 (Summer 2015), pp. 47–86.

Mark S. Bell, "Beyond Emboldenment: How Acquiring Nuclear Weapons Can Change Foreign Policy,"  International Security , Vol. 40, No. 1 (Summer 2015), pp. 87–119.

Reviewers: Thomas Maddux, Hal Brands, Julia M. Macdonald, Leopoldo Nuti, and Elisabeth Roehrlich

Max Paul Friedman and Tom Long, "Soft Balancing in the Americas: Latin American Opposition to U.S. Intervention, 1898-1936,"   International Security , Vol. 40, No. 1 (Summer 2015), pp. 120–156. 

Reviewer: Christopher Darnton

Max Paul Friedman and Tom Long reply . 

Spring 2015

Michael Beckley, "The Myth of Entangling Alliances,"  International Security , Vol. 39, No. 4 (Spring 2015), pp. 7-48.

Reviewer: Jennifer Lind

Gene Gerzhoy, "Alliance Coercion and Nuclear Restraint: How the United States Thwarted West Germany’s Nuclear Ambitions,"  International Security , Vol. 39, No. 4 (Spring 2015), pp. 91-129.

Reviewer: Nicholas Miller

Winter 2014/15

Jon R. Lindsay, "The Impact of China on Cybersecurity: Fiction and Friction,"  International Security , Vol. 39, No. 3 (Winter 2014/15), pp. 7-47.

Reviewer: Xiaoyu Pu

Sebastian Rosato, "The Inscrutable Intentions of Great Powers,"  International Security , Vol. 39, No. 3 (Winter 2014/15), pp. 48-88.

Reviewers: Brandon Yoder and Kyle Haynes

Jaganath Sankaran, "Pakistan’s Battlefield Nuclear Policy: A Risky Solution to an Exaggerated Threat,"  International Security , Vol. 39, No. 3 (Winter 2014/15), pp. 118-151.

Reviewer: Christopher Clary

Llewelyn Hughes and Austin Long, "Is There an Oil Weapon? Security Implications of Changes in the Structure of the International Oil Market,"  International Security , Vol. 39, No. 3 (Winter 2014/15), pp. 152-189.

Reviewer: Jeff Colgan

Spring 2014

Gaurav Kampani, "New Delhi's Long Nuclear Journey: How Secrecy and Institutional Roadblocks Delayed India's Weaponization,"  International Security , Vol. 38, No. 4 (Spring 2014), pp. 79-114.

Reviewer: Jayita Sarkar, Belfer Center for Science and International Affairs

Reply by Gaurav Kampani

Spring 2013

Alexander B. Downes and Jonathan Monten, "Forced to be Free? Why Foreign-Imposed Regime Change Rarely Leads to Democratization,"  International Security , Vol. 37, No. 4 (Spring 2013), pp. 90-131.

Reviewer: Mark Peceny, University of New Mexico

Winter 2012/13

Stephen Brooks, G. John Ikenberry, and William Wohlforth, "Don’t Come Home, America: The Case against Retrenchment,"  International Security , Vol. 37, No. 3 (Winter 2012/2013), pp. 7–51 .

Reviewer: Colin Dueck, George Mason University

Benjamin S. Lambeth, "Israel’s War in Gaza: A Paradigm of Effective Military Learning and Adaptation,"  International Security , Vol. 37 No. 2 (Fall 2012), pp. 81-118; and Jerome Slater, "Just War Moral Philosophy and the 2008-09 Israeli Campaign in Gaza," International Security,  Vol. 37 No. 2 (Fall 2012), pp. 44-80 .

Reviewer: Jeremy Pressman, University of Connecticut

Brendan Rittenhouse Green, "Two Concepts of Liberty: U.S. Cold War Grand Strategies and the Liberal Tradition,"  International Security , Vol. 37, No. 2 (Fall 2012), pp. 9–43 .

Reviewer: Paul C. Avey

Summer 2012

Stephen Biddle, Jeffrey Friedman, and Jacob Shapiro, "Testing the Surge: Why Did Violence Decline in Iraq in 2007?"  International Security,  Vol. 37, No. 1 (Summer 2012), pp. 7–40 .

Reviewer: Austin Long

Spring 2012

Patrick B. Johnston, "Does Decapitation Work? Assessing the Effectiveness of Leadership Targeting in Counterinsurgency Campaigns,"  International Security , Vol. 36, No. 4 (Spring 2012), pp. 47–79; and Bryan C. Price, "Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism,"  International Security , Vol. 36, No. 4 (Spring 2012), pp. 9 – 46 .

Reviewer: Jenna Jordan, Georgia Institute of Technology

Paul C. Avey, "Confronting Soviet Power: U.S. Policy during the Early Cold War," International Security , Vol. 36, No. 4 (Spring 2012), pp. 151–188 .

Reviewer: Joseph M. Siracusa, Royal Melbourne Institute of Technology, Melbourne, Australia

Winter 2011/12

Nuno Monteiro, "Unrest Assured: Why Unipolarity is Not Peaceful,"  International Security , Vol. 36, No. 3 (Winter 2011/12), pp. 9–40 .

Reviewer: William C. Wohlforth, Dartmouth College

David Ekbladh, "Present at the Creation: Edward Mead Earle and the Depression-Era Origins of Security Studies,"  International Security , Vol. 36, No. 3 (Winter 2011/12), pp. 107–141 .

Reviewer: Robert Vitalis, University of Pennsylvania

Bruce W. Bennett and Jennifer Lind, "The Collapse of North Korea: Military Missions and Requirements,"  International Security , Vol. 36, No. 2 (Fall 2011), pp. 84–119 .

Reviewer: Brendan M. Howe, Ewha Womans University, Seoul

Spring 2011

Paul K. MacDonald and Joseph M. Parent, "Graceful Decline? The Surprising Success of Great Power Retrenchment,"  International Security , Vol. 35, No. 4 (Spring 2011), pp. 7–44 .

Reviewer: Stephen R. Rock, Vassar College

Michael S. Gerson, "No First Use: The Next Step for U.S. Nuclear Policy,"  International Security , Vol. 35, No. 2 (Fall 2010), pp. 7–47 .

Reviewer: Joshua Rovner, U.S. Naval War College

Spring 2010

John M. Schuessler, "The Deception Dividend: FDR’s Undeclared War,"  International Security , Vol. 34, No. 4 (Spring 2010), pp. 133–165 .

Reviewer: Marc Trachtenberg, University of California, Los Angeles

Winter 2009/10

Francis J. Gavin, "Same As It Ever Was: Nuclear Alarmism, Proliferation, and the Cold War,"  International Security , Vol. 34, No. 3 (Winter 2009/10), pp. 7–37 .

Reviewer: John Mueller, Ohio State University

A cumulative index of all articles published in International Security is provided below as an Excel document.

Cumulative Index for International Security , through Vol. 47, No. 4 (Spring 2023)

Belfer Center Email Updates

Belfer center of science and international affairs.

79 John F. Kennedy Street, Cambridge, MA 02138 (617) 495-1400

  • Search Menu
  • Editor's Choice
  • Author Guidelines
  • Submission Site
  • Open Access
  • About Journal of Cybersecurity
  • Editorial Board
  • Advertising and Corporate Services
  • Journals Career Network
  • Self-Archiving Policy
  • Journals on Oxford Academic
  • Books on Oxford Academic

Issue Cover

Editors-in-Chief

Tyler Moore

About the journal

Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security …

Latest articles

Cybersecurity Month

Call for Papers

Journal of Cybersecurity is soliciting papers for a special collection on the philosophy of information security. This collection will explore research at the intersection of philosophy, information security, and philosophy of science.

Find out more

CYBERS High Impact 480x270.png

High-Impact Research Collection

Explore a collection of freely available high-impact research from 2020 and 2021 published in the Journal of Cybersecurity .

Browse the collection here

submit

Submit your paper

Join the conversation moving the science of security forward. Visit our Instructions to Authors for more information about how to submit your manuscript.

Read and publish

Read and Publish deals

Authors interested in publishing in Journal of Cybersecurity may be able to publish their paper Open Access using funds available through their institution’s agreement with OUP.

Find out if your institution is participating

Related Titles

cybersecurityandcyberwar

Affiliations

  • Online ISSN 2057-2093
  • Print ISSN 2057-2085
  • Copyright © 2024 Oxford University Press
  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Institutional account management
  • Rights and permissions
  • Get help with access
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Programs submenu

Regions submenu, topics submenu, the role of fast payment systems in addressing financial inclusion, modernizing army software acquisition: panel discussion with dasa(sar) margaret boatner and peo iew&s bg ed barker, book event: the mountains are high, energy security and geopolitics conference.

  • Abshire-Inamori Leadership Academy
  • Aerospace Security Project
  • Africa Program
  • Americas Program
  • Arleigh A. Burke Chair in Strategy
  • Asia Maritime Transparency Initiative
  • Asia Program
  • Australia Chair
  • Brzezinski Chair in Global Security and Geostrategy
  • Brzezinski Institute on Geostrategy
  • Chair in U.S.-India Policy Studies
  • China Power Project
  • Chinese Business and Economics
  • Defending Democratic Institutions
  • Defense-Industrial Initiatives Group
  • Defense 360
  • Defense Budget Analysis
  • Diversity and Leadership in International Affairs Project
  • Economics Program
  • Emeritus Chair in Strategy
  • Energy Security and Climate Change Program
  • Europe, Russia, and Eurasia Program
  • Freeman Chair in China Studies
  • Futures Lab
  • Geoeconomic Council of Advisers
  • Global Food and Water Security Program
  • Global Health Policy Center
  • Hess Center for New Frontiers
  • Human Rights Initiative
  • Humanitarian Agenda
  • Intelligence, National Security, and Technology Program
  • International Security Program
  • Japan Chair
  • Kissinger Chair
  • Korea Chair
  • Langone Chair in American Leadership
  • Middle East Program
  • Missile Defense Project
  • Project on Critical Minerals Security
  • Project on Fragility and Mobility
  • Project on Nuclear Issues
  • Project on Prosperity and Development
  • Project on Trade and Technology
  • Renewing American Innovation Project
  • Scholl Chair in International Business
  • Smart Women, Smart Power
  • Southeast Asia Program
  • Stephenson Ocean Security Project
  • Strategic Technologies Program
  • Transnational Threats Project
  • Wadhwani Center for AI and Advanced Technologies
  • All Regions
  • Australia, New Zealand & Pacific
  • Middle East
  • Russia and Eurasia

American Innovation

Civic education, climate change, cybersecurity, defense budget and acquisition, defense and security, energy and sustainability, food security, gender and international security, geopolitics, global health, human rights, humanitarian assistance, intelligence, international development, maritime issues and oceans, missile defense, nuclear issues, transnational threats, water security.

The Center for Strategic & International Studies (CSIS) examines research topics surrounding global studies, international relations, & foreign policy issues.

Photo: Adobe Stock

international security research paper

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

International Security

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Last »
  • Security Studies Follow Following
  • International Relations Theory Follow Following
  • International Relations Follow Following
  • Foreign Policy Analysis Follow Following
  • International Studies Follow Following
  • Critical Security Studies Follow Following
  • Russian Foreign Policy Follow Following
  • Strategic Studies Follow Following
  • Peace and Conflict Studies Follow Following
  • Security Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

International Security and Arms Control

Academic Writing Service

International Security and Arms Control Research Paper Topics

  • Nuclear deterrence theory and its implications for international security.
  • The evolution of arms control agreements and their effectiveness.
  • The role of the UN Security Council in international security and arms control.
  • The rise of cyber warfare and its impact on international security.
  • The role of regional organizations in promoting international security and arms control.
  • The impact of climate change on international security and arms control.
  • The impact of globalization on international security and arms control.
  • The effectiveness of economic sanctions as a tool for international security and arms control.
  • The role of intelligence agencies in promoting international security and arms control.
  • The impact of artificial intelligence on international security and arms control.
  • The impact of emerging technologies on international security and arms control.
  • The impact of non-state actors on international security and arms control.
  • The role of international law in promoting international security and arms control.
  • The impact of globalization on the proliferation of weapons of mass destruction.
  • The impact of globalization on the illicit arms trade.
  • The role of human rights in promoting international security and arms control.
  • The role of civil society in promoting international security and arms control.
  • The impact of social media on international security and arms control.
  • The impact of the media on public opinion and international security and arms control.
  • The role of diplomacy in promoting international security and arms control.
  • The impact of nationalism on international security and arms control.
  • The impact of populism on international security and arms control.
  • The impact of religion on international security and arms control.
  • The impact of ethnic conflict on international security and arms control.
  • The impact of territorial disputes on international security and arms control.
  • The role of international organizations in promoting international security and arms control.
  • The impact of transnational crime on international security and arms control.
  • The impact of the military-industrial complex on international security and arms control.
  • The impact of arms races on international security and arms control.
  • The impact of peacekeeping operations on international security and arms control.
  • The impact of economic interdependence on international security and arms control.
  • The impact of nuclear accidents and disasters on international security and arms control.
  • The impact of terrorism on international security and arms control.
  • The impact of cyber attacks on international security and arms control.
  • The role of intelligence sharing in promoting international security and arms control.
  • The role of military alliances in promoting international security and arms control.
  • The impact of foreign aid on international security and arms control.
  • The impact of trade agreements on international security and arms control.
  • The role of international norms in promoting international security and arms control.
  • The impact of economic sanctions on international security and arms control.
  • The role of the private sector in promoting international security and arms control.
  • The impact of corruption on international security and arms control.
  • The impact of nationalism on the arms race.
  • The impact of the military-industrial complex on international relations.
  • The impact of peacekeeping missions on the arms race.
  • The impact of military alliances on arms control agreements.
  • The role of the United Nations in promoting international security and arms control.
  • The impact of globalization on nuclear proliferation.
  • The impact of nationalism on the illicit arms trade.

International security refers to the condition of stability and peace among nations, achieved through a combination of diplomatic, military, economic, and other means. Arms control, on the other hand, refers to efforts by countries to limit the development, production, or deployment of weapons, or to reduce existing stockpiles. The goal of arms control is to reduce the likelihood of conflict and promote stability among nations. These two concepts are often intertwined, as arms control agreements are frequently used to enhance international security.

Academic Writing, Editing, Proofreading, And Problem Solving Services

Get 10% off with 24start discount code.

The history of international security and arms control can be traced back to the end of World War I, when the Treaty of Versailles was signed. This treaty included provisions aimed at reducing the military capabilities of Germany, and established the League of Nations as a forum for resolving international disputes peacefully. However, the failure of the League of Nations to prevent the outbreak of World War II demonstrated the limitations of international organizations in promoting peace and security.

Following World War II, the United States and the Soviet Union emerged as the two superpowers of the world, and their rivalry shaped the course of international security and arms control for the next several decades. The Cold War, which lasted from the late 1940s until the early 1990s, was characterized by a nuclear arms race between the two superpowers. The development and deployment of nuclear weapons created a situation of mutual deterrence, as each side feared the devastating consequences of a nuclear war.

Since the end of the Cold War, international security and arms control have continued to be major concerns for policymakers and scholars. The proliferation of nuclear weapons to additional countries, the emergence of non-state actors such as terrorist groups, and the development of new technologies such as cyber weapons have all presented new challenges to global security. In recent years, tensions between major powers such as the United States, Russia, and China have also raised concerns about the potential for conflict and the need for effective arms control measures.

To address these challenges, policymakers and scholars have developed a range of strategies and approaches. One approach is to negotiate arms control agreements, such as the Strategic Arms Reduction Treaty (START) between the United States and Russia, which aims to reduce the number of nuclear warheads deployed by both countries. Another approach is to strengthen international institutions such as the United Nations, which can provide a forum for resolving conflicts peacefully and promoting international cooperation. Additionally, some scholars have called for greater attention to non-military aspects of international security, such as economic development, environmental sustainability, and human rights.

In conclusion, international security and arms control are crucial topics in political science, as they relate to issues of peace, war, and global stability. The historical background of these concepts can be traced back to the aftermath of World War I, and their development has been shaped by the rivalry between the United States and the Soviet Union during the Cold War. In the post-Cold War era, new challenges such as the proliferation of nuclear weapons, the rise of non-state actors, and tensions between major powers have presented new challenges to global security. Policymakers and scholars have developed a range of strategies and approaches to address these challenges, and the field of international security and arms control continues to evolve as new threats emerge.

ORDER HIGH QUALITY CUSTOM PAPER

international security research paper

Global cyber attack around the world with planet Earth viewed from space and internet network communication under cyberattack portrayed with red icons of an unlocked padlock.

World-first “Cybercrime Index” ranks countries by cybercrime threat level

Following three years of intensive research, an international team of researchers have compiled the first ever ‘World Cybercrime Index’, which identifies the globe’s key cybercrime hotspots by ranking the most significant sources of cybercrime at a national level.

The Index, published today in the journal PLOS ONE , shows that a relatively small number of countries house the greatest cybercriminal threat. Russia tops the list, followed by Ukraine, China, the USA, Nigeria, and Romania. The UK comes in at number eight.

A white woman with long brown hair standing in front of a hedge. A white man wearing a check shirt standing in front of a bookcase.

‘The research that underpins the Index will help remove the veil of anonymity around cybercriminal offenders, and we hope that it will aid the fight against the growing threat of profit-driven cybercrime,’ Dr Bruce said.

‘We now have a deeper understanding of the geography of cybercrime, and how different countries specialise in different types of cybercrime.’

‘By continuing to collect this data, we’ll be able to monitor the emergence of any new hotspots and it is possible early interventions could be made in at-risk countries before a serious cybercrime problem even develops.’

The data that underpins the Index was gathered through a survey of 92 leading cybercrime experts from around the world who are involved in cybercrime intelligence gathering and investigations. The survey asked the experts to consider five major categories of cybercrime*, nominate the countries that they consider to be the most significant sources of each of these types of cybercrime, and then rank each country according to the impact, professionalism, and technical skill of its cybercriminals.

List of countries with their World Cybercrime Index score. The top ten countries are Russia, Ukraine, China, the US, Nigeria, Romania, North Korea, UK, Brazil and India.

Co-author Associate Professor Jonathan Lusthaus , from the University of Oxford’s Department of Sociology and Oxford School of Global and Area Studies, said cybercrime has largely been an invisible phenomenon because offenders often mask their physical locations by hiding behind fake profiles and technical protections.

'Due to the illicit and anonymous nature of their activities, cybercriminals cannot be easily accessed or reliably surveyed. They are actively hiding. If you try to use technical data to map their location, you will also fail, as cybercriminals bounce their attacks around internet infrastructure across the world. The best means we have to draw a picture of where these offenders are actually located is to survey those whose job it is to track these people,' Dr Lusthaus said.

Figuring out why some countries are cybercrime hotspots, and others aren't, is the next stage of the research. There are existing theories about why some countries have become hubs of cybercriminal activity - for example, that a technically skilled workforce with few employment opportunities may turn to illicit activity to make ends meet - which we'll be able to test against our global data set. Dr Miranda Bruce  Department of Sociology, University of Oxford and UNSW Canberra   

Co-author of the study, Professor Federico Varese from Sciences Po in France, said the World Cybercrime Index is the first step in a broader aim to understand the local dimensions of cybercrime production across the world.

‘We are hoping to expand the study so that we can determine whether national characteristics like educational attainment, internet penetration, GDP, or levels of corruption are associated with cybercrime. Many people think that cybercrime is global and fluid, but this study supports the view that, much like forms of organised crime, it is embedded within particular contexts,’ Professor Varese said.

The World Cybercrime Index has been developed as a joint partnership between the University of Oxford and UNSW and has also been funded by CRIMGOV , a European Union-supported project based at the University of Oxford and Sciences Po. The other co-authors of the study include Professor Ridhi Kashyap from the University of Oxford and Professor Nigel Phair from Monash University.

The study ‘Mapping the global geography of cybercrime with the World Cybercrime Index’ has been published in the journal PLOS ONE .

*The five major categories of cybercrime assessed by the study were:

1.   Technical products/services (e.g. malware coding, botnet access, access to compromised systems, tool production).

2.   Attacks and extortion (e.g. denial-of-service attacks, ransomware).

3.   Data/identity theft (e.g. hacking, phishing, account compromises, credit card comprises).

4.   Scams (e.g. advance fee fraud, business email compromise, online auction fraud).

5.   Cashing out/money laundering (e.g. credit card fraud, money mules, illicit virtual currency platforms).

Subscribe to News

DISCOVER MORE

  • Support Oxford's research
  • Partner with Oxford on research
  • Study at Oxford
  • Research jobs at Oxford

You can view all news or browse by category

international security research paper

International Journal of Information Security

  • Presents important technical work in information security, whether theoretical, applicable, or related to implementation
  • Covers system security, network security, content protection, applications
  • Contents include privacy, access control, authentication, identification, applied cryptography, and formal methods in information security

This is a transformative journal , you may have access to funding.

  • Sokratis Katsikas

international security research paper

Latest issue

Volume 23, Issue 2

Latest articles

A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

  • Saeed Banaeian Far
  • Maryam Rajabzadeh Asaar
  • Afrooz Haghbin

international security research paper

Enhancing security in QCA-based circuits using optimal key gate placement

  • K. R. Kavitha

international security research paper

Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard

  • Abdullah Hamad N. Almoqbil

international security research paper

Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network

  • Kousik Barik
  • Sanjay Misra
  • Luis Fernandez-Sanz

international security research paper

Selfish mining attack in blockchain: a systematic literature review

  • Nadisha Madhushanie
  • Sugandima Vidanagamachchi
  • Nalin Arachchilage

international security research paper

Journal updates

Past special issues.

Before submitting a special issue proposal, please check that there are no past special issues on the same topic.

Call for Papers: Interdisciplinary Perspectives for SocioTechnical Cybersecurity Threats

Guest Editors:  Kovila Coopamootoo, Shujun Li, Michael Sirivianos, Pavlos Efraimidis Democritus, George Drosatos, Marios Anagnostopoulos

Deadline:  4 July 2024

Call For Papers: Cyber Physical Systems and Industry 4.0: Security and Privacy Challenges and Solutions

Guest Editors: Weizhi Meng, Alvaro A. Cardenas, Jianying Zhou

Deadline: May 30, 2022

Call for Papers: International Journal of Information Security Survey Track

Deadline: Manuscripts will be reviewed on a rolling basis.

Journal information

  • ACM Digital Library
  • Australian Business Deans Council (ABDC) Journal Quality List
  • Current Contents/Engineering, Computing and Technology
  • EI Compendex
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • OCLC WorldCat Discovery Service
  • Science Citation Index Expanded (SCIE)
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Springer policies

© Springer-Verlag GmbH Germany, part of Springer Nature

  • Find a journal
  • Publish with us
  • Track your research

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/publications/safeguarding-international-science-research-security-framework

Safeguarding International Science: Research Security Framework

Download paper, additional citation formats.

  • Google Scholar

IMAGES

  1. Example Of Cyber Security Research Paper

    international security research paper

  2. (PDF) The Role of Artificial Intelligence in Cyber Security

    international security research paper

  3. (PDF) National Security

    international security research paper

  4. Research paper on cyber security

    international security research paper

  5. (PDF) Phishing: A Computer Security Threat

    international security research paper

  6. (PDF) Information Security Research: Actual Trends and Directions

    international security research paper

VIDEO

  1. Ensuring cybersecurity of ICS: Life after Russia’s law on critical information infrastructure

  2. homeland security research paper presentation Diamone hailstock 1

  3. Network Security Research Paper

  4. 6th Annual CSPS Symposium on International Security

  5. Cyber Threat Detection using Machine Learning || Information Security || Research Paper Presentation

COMMENTS

  1. International Security

    International Security, the #2 journal in International Relations based on 2021 impact factor, publishes lucid, well-documented essays on the full range of contemporary security issues.Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging ...

  2. International Security

    International Security publishes lucid, well-documented essays on all aspects of the control and use of force, from all political viewpoints. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy and have set the agenda for scholarship on ...

  3. Overview

    International Security is America's leading peer-reviewed journal of security affairs. It provides sophisticated analyses of contemporary, theoretical, and historical security issues. International Security is edited at Harvard University's Belfer Center for Science and International Affairs and is published by The MIT Press. Subscribe to Journal.

  4. Conflict, Peace and Security: An International Relations Perspective

    Conflict, peace and security are some of the enduring concerns of the Peace Research Movement of the 1950s and 1960s. They have become integrated in the dominant disciplines of international relations (IR) and political science and now are also part of most of the social science disciplines, such as economics, sociology, public policy, gender studies, international law and so on.

  5. Analysis

    The CSIS International Security Program leads a rigorous analytic agenda covering the most pressing challenges facing the U.S. globally. Our research projects range from multi-year reports to short commentaries and opinion pieces on breaking news.

  6. (PDF) Globalization and International Terrorism: Its Implications on

    The paper will interrogate the various ways in which globalization has contributed to the rise in international terrorism and the challenges it presents for global peace and security.

  7. Research paper A comprehensive review study of cyber-attacks and cyber

    The cyber-security policy is accepted by the regulatory framework and is officially applied lonely to the relevant areas of the regulator. Security policy components vary according to the policy spectrum (Cheng et al., 2020). The national cyber-security policy, for example, includes all citizens and perhaps foreign businessmen working in its ...

  8. Geopolitics and International Security: Research & Analysis

    Since the end of the Cold War, the definition of international security has evolved immensely. CSIS is constantly working to engage with diverse actors and issues that present security threats in the twenty-first century. This research is led by the International Security Program, the Arleigh A. Burke Chair in Strategy, and the Zbigniew Brzezinski Chair in Global Security and Geostrategy and ...

  9. Journal of Cybersecurity

    A systematic literature review on advanced persistent threat behaviors and its detection strategy. Journal of Cybersecurity is soliciting papers for a special collection on the philosophy of information security. This collection will explore research at the intersection of philosophy, information security, and philosophy of science.

  10. Artificial Intelligence and International Security: The Long View

    2 For a full listing, see Neil Davison and Gilles Giacca, "Part III: Background Paper Prepared by the International Committee of the Red Cross," in Autonomous Weapon Systems: Implications of Increasing Autonomy in the Critical Functions of Weapons (meeting report, International Committee of the Red Cross, Versoix, Switzerland, March 15-16 ...

  11. (PDF) Globalization and International Security. An Overview

    PDF | On Jan 1, 2015, Teresa Rodrigues and others published Globalization and International Security. An Overview | Find, read and cite all the research you need on ResearchGate

  12. Too Close for Comfort: Cyber Terrorism and Information Security across

    Cyber terrorism is an elusive concept. Most definitions make a distinction between on the one hand politically motivated violent acts, or the threat thereof, using the internet, and on the other hand all the preparatory and supporting activities for terrorism done on or via the internet, such as recruitment, communication and financing.

  13. Topics on International Relations & Foreign Policy

    Center for Strategic and International Studies 1616 Rhode Island Avenue, NW Washington, DC 20036. Tel: 202.887.0200 Fax: 202.775.3199

  14. Mapping the knowledge of national security in 21st century a

    The study gives a detailed view of national security research with dominant articles which really influence the course of this concept and are shaping the future trends. ... titled "The evolution of international security studies ... A comprehensive security analysis. Security Discussion Papers. Series 1 edn. Grouped' Etudesetd' Expertise ...

  15. Arming Vietnam: Widened International-security Relations in ...

    Vietnam faces a serious long-term security challenge from China's growing assertiveness in the South China Sea, and its response has included efforts to strengthen its military capability, particularly in the maritime sphere. This report assesses the extent of these efforts and looks at how Hanoi has used a widened array of international security relationships to diversify Vietnam's ...

  16. International Security

    13 answers. Feb 19, 2021. There is consensus on the principle that cybersecurity can better be achieved through transnational cooperation rather every country or block on its own. Yet, the work ...

  17. International Security Research Papers

    Securitizing Youth offers new insights on young people's engagement in a wide range of contexts related to the peace and security field. It presents empirical findings on the challenges and opportunities faced by young women and men in... more. View International Security Research Papers on Academia.edu for free.

  18. Role of UN in Maintenance of International Peace & Security

    The United Nations (UN) is an international organization whose stated aims are facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace. The UN was founded in 1945 after World War II to replace the League of Nations, to stop wars between countries ...

  19. International Security and Arms Control Research Paper Topics

    See the list of 50 political science research paper topics related to international security and arms control. International security and arms control are crucial topics in the field of political science, as they relate to issues of peace, war, and global stability. The proliferation of nuclear weapons, the threat of terrorism, and the impact ...

  20. World-first "Cybercrime Index" ranks countries by cybercrime threat

    World-first "Cybercrime Index" ranks countries by cybercrime threat level. Following three years of intensive research, an international team of researchers have compiled the first ever 'World Cybercrime Index', which identifies the globe's key cybercrime hotspots by ranking the most significant sources of cybercrime at a national level.

  21. Home

    The International Journal of Information Security is a comprehensive resource for critical advancements in the field of information security. Presents important technical work in information security, whether theoretical, applicable, or related to implementation. Covers system security, network security, content protection, applications.

  22. Piracy as a Threat to International Peace and Security

    The study focuses on specific issues in the system of international security related to modern-day piracy. The first part examines the adequacy of the classical ... Piracy as a Threat to International Peace and Security (April 15, 2015). Higher School of Economics Research Paper No. WP BRP 14/IR/2015, Available at SSRN: https://ssrn.com ...

  23. Safeguarding International Science: Research Security Framework

    This Framework is designed to enable organizations to implement a mission-focused, integrated, risk-balanced program through the application of research security principles and best practices that fosters the safeguarding of international science while mitigating risks to the integrity of the open collaborative environment.

  24. (PDF) ADVANCES IN NETWORK SECURITY: A COMPREHENSIVE ...

    security research issues in this paper to help researchers. ... International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, pp. 156-163, 2019. ...

  25. Retirement, Social Security deferral, and life annuity demand

    Delaying Social Security is equivalent to purchasing an inflation-indexed life annuity; it involves forgoing current benefits in exchange for higher real benefits in the future. Although the terms for deferring retired worker benefits between ages 62 and 70 are generous, most people claim benefits well before age 70.