Publishing your Work in a Blog Article

The Centre for Security Failures Studies offers you the opportunity to publish articles directly on its website’s blog. If not done already, please discover why you should publish with us.

Aims and Scope

The articles published by the Centre for Security Failures Studies are standalone and original pieces of work which are presenting, describing, critically analysing and discussing around any sort of security related topic, information, news, idea, issues and/or problems such as security failures, security incidents and security breaches. Articles should take a pragmatic approach and offer both timely and practical insights. Articles should, where appropriate, include references and/or hyperlinks to sources.

The articles we publish are fertile terrains for interaction between peers to take place as for comments are open (but moderated where necessary). Written by security experts, senior security professionals, international speakers, security journalists and students, these pieces of work are enabling information exchange among peers and facilitating collaborative and constructive discussions. Articles are also allowing authors and commentators to raise their profile globally and are remaining, after all, fantastic playgrounds for those who want to improve their writing and analytical skills.

The articles and blog audience is comprised of security professionals and practitioners who are interested in security related information and news in general terms and about interaction with peers more specifically. Law enforcement officers and students alike are also an important part of the articles readership.

The Articles we Publish Cover

There are no particular topics scoping the articles we publish and authors are free to write about what they prefer, know about and about the topics which relate the most to their expertise. However, in order to perhaps provide some initial guidance, authors are encouraged to discuss, for example, about the following topics:

Books on Security and Risk
Business Continuity and Disaster Recovery Planning
Continuity of Operations Planning (COOP)
Corporate Security and Risk Management
Counter Fraud and Fraud Prevention
Crime Mapping
Crime Prevention and Community Safety
Crime Prevention Through Environmental Design (CPTED)
Criminal Justice
Criminology
Cyber Intelligence
Cyber Security
Dissertations Topics (whatever Levels)
Doctoral Thesis Topics
Enterprise Security Management Practices
Enterprise-wide System Development Security
Forensic Psychology
Information Security and Risk Management
Intelligence
International Police Cooperation
Investigation and Brand Protection
Laws, Investigations, Forensics and Ethics
Nuclear and Radiological Security
Operations Security
Organisational Learning
Organisational Resilience
Organised Crime Prevention
Peace Building
Physical (Environmental) Security
Police Engagement
Policing
Regulations and Compliance
Research Methods
Risk, Response, and Recovery
Security Architecture and Design
Security Breaches
Security Consulting
Security Failures
Security Incidents
Security Operations and Administration
Security Policies
Security Problems
Security Procedures
Security Risk Analysis
Security Risk Management
Security Sector Reform
Security Standards, Guidelines, Criteria
Supply Chain Security
Systems Security Engineering
Telecommunications and Network Security
Terrorism Prevention and Counter Terrorism
Threats Modelling
Upcoming Security Events and Conferences

Articles should inform readers about any topic related to security in its broadest sense and can be related to whatever problem related to security. Articles should be constructive pieces of work and engage with the audience. Articles can also be in relation to a coursework a student did, an essay or a report written during a University degree or a BSc or MSc dissertation.

Are you Interested in Publishing your Article on our Blog?

Please read the guidance for authors