Authoring a book chapter in Security and Risk Management: Critical Reflections and International Perspectives.
Thank you for choosing to submit your paper to us. These instructions will ensure we have everything required so your paper can move through peer review, production and publication smoothly. Please take the time to read and follow them as closely as possible, as doing so will ensure your paper matches the book series’s requirements.
Please make sure you have formatted your paper according to the book series’s guidelines, as described below. The Centre for Security Failures Studies publishes original, previously unpublished papers and very rarely republishes seminal works with authorisations. Manuscripts should be submitted to the relevant book series’s editors according to following criteria.
If your paper falls in Research Cluster 1 – Intelligence; Organised Crime; Financial Crime; National Security; Terrorism Prevention, Counter Terrorism and Pre-Trial Investigation – then contact Dr Nicholas Gilmour, Dr Gediminas Bučiȗnas or Matthieu Petrigh.
If your paper falls in Research Cluster 2 – Business Continuity and Disaster Recovery Planning; Organisational Resilience; Regulation and Compliance; Risk, Response and Recovery and Supply Chain Security – then contact Phillip Wood MBE or Matthieu Petrigh.
If your paper falls in Research Cluster 3: Crime Prevention and Community Safety; Security Sector Reform; International Police Cooperation; Police Engagement and Policing – then contact Simon de Saint-Claire, PhD or Matthieu Petrigh.
If you paper falls in Research Cluster 6: Corporate Security and Security Related Risks; Emerging Market Geopolitical Risks and Security Convergence Strategies – then contact Luca Tenzi or Matthieu Petrigh.
If you paper falls in Research Cluster 7: Enterprise Security Risk Management; Physical (Environmental) Security; Insider Threat and Corporate and Risk Management – then contact Stephen Langley or Matthieu Petrigh.
If your paper falls in Research Cluster 8: Continuity of Operations Planning; Counter Fraud and Fraud Prevention; Cyber Intelligence; Cyber Security; Enterprise-Wide System Development Security; Forensic Psychology; Information Security and Risk Management; Investigation and Brand Protection; Laws, Investigations, Forensics and Ethics; Nuclear and Radiological Security; Operations Security; Peace Building; Security Standards, Guidelines and Criteria; Security Architecture and Design; Security Operations and Administration; Security Risk Analysis; Systems Security Engineering; Telecommunication and Network Security – then contact Matthieu Petrigh.
However, before submitting their manuscript, authors are encouraged to discuss the theme of their paper with any of the book series editors.
A typical paper length is between 8,000 and 10,000 words with each figure or table counted as 300 words. Please make sure that the text is 1.2-point spaced and in 12-point Helvetica and 1 point-spaced and in 9 to 10-point Helvetica only if and where necessary (i.e.: in Tables and Figures). Short biographies for all authors should be provided at the time of submission, along with contact information and an indication of the corresponding author. Submissions will not be considered until a biography is submitted.
Please note that the Centre for Security Failures Studies uses iThenticate® software to screen papers for unoriginal material. By submitting your paper for publication into the book series Security and Risk Management: Critical Reflections and International Perspectives, you are agreeing to any necessary originality checks your paper may have to undergo during the peer review and production processes.
Submission of Manuscripts
Format and Presentation. Security and Risk Management: Critical Reflections and International Perspectives requires a main document and its related source files if a manuscript was compiled with LaTex. The format of the whole document is 21 x 29.7 cm (8.5″ x 11″ – A4), page orientation is vertical. The main document, which is used for review, must be a Word, Pages or PDF file. Please include your rendered file (Word, Pages or PDF, e.g.) and its original source file (LaTex) if necessary with your submission. Keep acronyms and abbreviations to a minimum and define those that do appear in the text. The appropriate usage of M-dashes and N-dashes would be appreciated. Footnotes are not typically used; if you need to include them, use the endnote format.
Structure. The structure of the manuscript is flexible but must be clear and includes the following: an abstract of 300-350 words, an introduction, few sections and subsections, a conclusion and a reference list.
Writing Style. Academic.
Figures, Tables, and Graphics. Upon initial manuscript submission, figures, tables, and other graphics should be included as part of the main document (embedded). All tables and figures must be mentioned in the text of a paper, and include a caption. All illustrations must be clear enough to be read when printed in black-and-white. Upon the acceptance of a manuscript, authors will be asked to submit separate art files (not embedded in text files). Digital files are recommended for highest quality reproduction and should follow these guidelines:
300 dpi or higher sized to fit on journal page JPEG or PNG format only
Screen shots: Save original screen shot captures in .jpg or .png format at a resolution of 300 dpi.
References. References should appear at the end of the book chapter in APA style, except when shown otherwise in the examples listed here. Cite in text the author and date, separated by a comma, in parentheses: (Smith, 2005). Use an ampersand, rather than “and” for multiple authors. For works with more than one author, provide all author names for the first citation in the text: (King, Marks, & McCoy, 2002). Then use “et al.” for subsequent citations of the same work: (King et al., 2002).
Journal Article: Clarke R. V. (2004). ‘Technology, criminology and crime science’. European Journal on Criminal Policy and Research, 10: 55-63.
Book: Button M. (2008). Doing security: critical reflections and an agenda for change. Basingstone: Palgrave Macmillan.
Book Chapter: Wakefield A. (2014). ‘Where next for the professionalisation of security?’ in M. Gill (ed.) The handbook of security, Second edition, (pp. 919-35). Basingstone: Palgrave Macmillan.
Electronic Sources: PKF (2015). The financial cost of fraud 2015: what the latest data from around the world shows. Retrieved 24 October 2015, from http://www.pkf.com/media/31640/PKF-The-financial-cost-of-fraud-2015.pdf
Further guidance on APA referencing can be found here.
An example of a previously published paper can be found here.
Book Chapter Review Process. Once submitted, a paper undergoes an initial review by the concerned book series editor(s). After a positive initial review, the paper undergoes a double-blind review process by two or more subject matter experts. Reviews are then received by the editor-in-chief, who then provides the author with an editor’s report that includes the final recommendation: a conditional acceptance, a request for further revisions, or rejection.
Prior to publication, all accepted papers are edited for style and grammar by the Centre for Security Failures Studies’s editor-in-chief. The author is also requested to complete a contractual agreement. If you plan to use graphics or tables from another publication, you must secure reprint permission from the appropriate publisher. Such permission is also needed for quotes of 50 words or more, or more than 400 words of material quoted from one source. All accepted manuscripts, artworks, and photographs remain the properties of the Author but are subject to terms and conditions.
Proofs. Page proofs are sent to the corresponding author before publication. They must be carefully checked and returned within 7 days of receipt.
Complimentary Policy and Reprints. Authors for whom we receive a valid email address will be provided with a free digital copy of their own work and an opportunity to purchase reprints of individual articles, or copies of the complete print issue at production cost (plus shipping).
Open Access.The Centre for Security Failures Studies’s Open Access provides authors or their research sponsors and founders with the option of paying a publishing fee of £149 (covering plagiarism checks and peer-review associated costs) and thereby making their book chapter permanently available for free online access – Open Access – immediately on publication to anyone, anywhere, at any time. This option is made available once a book chapter has been accepted in peer review. The option Open Access will work alongside a Creative Common license to be selected by the Author.
More information about Open Access can be found, for example, on Wikipedia at: https://en.wikipedia.org/wiki/Open_access
More information about Creative Commons and their licenses can be found, for example, at: https://creativecommons.org/licenses/
Royalties for Authors
Publishing with the Centre for Security Failures Studies means that you will be receiving proper royalties for your hard work. Once a book is edited and published, each contributing author of that particular book will receive an equal share of all the royalties earned after each sale of that book, whatever the format might be (hardback, paperback or e-book). The total amount of royalties earned is independently calculated by CreateSpace, a company which is part of Amazon group of companies and depends upon different factors, such as the book RRP and the sales channels being used to sell the book.
When individual book chapters are sold in e-format, 75% of what is earned will be reversed to the author of the particular book chapter having been sold. In this specific case, each sale is dealt with by the Centre for Security Failures Studies and royalties earned by authors are constant. For example, when a book chapter is sold £4.90, the total amount reversed to its author will be £3.67.
Payments to authors are made on a quarterly basis via bank transfer or Paypal.
Authors publishing articles with us will have, if they want, their profile displayed on our website. This profile can include a picture, a brief description, a video and a contact form linking to their own email address. Examples of profiles can be found here.
We are here to clarify doubts, if any. Please use our contact page to raise your concerns.