Call for Chapters - The Palgrave Handbook of Global Cybersecurity

Scott Romaniuk's picture
Call for Papers
August 27, 2017 to May 1, 2018
United States
Subject Fields: 
Political Science, Public Policy, Research and Methodology, Social Sciences, Diplomacy and International Relations

The Palgrave Handbook of Global Cybersecurity

Author Requirements:

Please submit a paper of between 8,000 to 10,000 words – including footnotes.

Use these questions as HEADINGS in your document.


You need:

  1.  An Abstract (200 words max) plus 3-5 key words
  2. Answers to all questions under the appropriate heading
  3. A conclusion
  4. A list of sources consulted
  5. A list of between 5-7 sources (journal articles, websites, etc.)  in English which readers can consult for further reference
  6. Contributors are welcome to use their own title consisting of a primary and secondary component or simply a primary title.
  7. Chapter may include tables and graphs but ensure that all data is referenced. Please avoid the need to obtain copyright permissions.
  8. ***Special chapters on cybersecurity related to the UN, NATO, the EU are also welcome.


Please use the following headers:


  1. Statement of national cybersecurity strategy:

Here you want to check to see if your country has issued a White Paper or national cyber strategy.  You want to briefly summarize this document, focusing on what the key strategic issues are for this nation in cyberspace at present and in the future.


  1. Definitions:

 What are some key terms that have been defined by your nation – including cybersecurity, cyberterrorism, critical infrastructure.  How does your nation’s definition of these terms differ from that of other members of the international community, if it does? 


  1. International Law: 

Does your nation “buy into” the generally accepted understandings regarding the applicability of international law to cyberspace?  In what ways, does it accept or reject these understandings? 


  1. International Governance: 

Does your country play a role in regional or international governance?  IS it generally supportive or not supportive of international governance institutions? The development of norms?


  1. Sovereignty (i.e.  “Russian cyberspace;” “Japanese cyberspace,” etc.) 

Does your nation claim sovereignty in cyberspace?  Does it regard the internet as its territory?  What powers does it claim in Cyberspace – the power to control the flow of information, to regulate speech on the internet, to have an internet kill switch?  Has it ever shut down the internet in your country?  When and under what circumstances?


  1.  My country’s cultural understandings:

? Can you identify any concepts which are culturally based that have affected how your nation views cyberspace issues – either domestically or internationally? (i.e.  privacy, surveillance, intellectual property)   What are they?


  1. My country’s institutions

Does your country have a Ministry of Information or a Ministry of Information Technology?  What departments or ministries are involved in making information technology policy in your country, and how does the decision to devolve power to this set of institutions affect the decisions that get made?


  1. Role of the Private Sector

Are there corporations or companies that are heavily involved in the making of internet policy in your country? What are they and how have they influenced policy making?


  1. The role of the legislature:

Summarize the key legislative developments that have occurred in making policy in your country in the areas of:  surveillance, cyberwarfare and intellectual property.  Please include a timeline if desired


  1. Cybercrime and cyberterrorism:

How are these issues combatted in your country?  Who is responsible?


11. Societal implications:

  Implications of cybercrime, cyberterrorism, and countering these threats on the  

  society in question.


*The volume will follow the sixth edition of Publication Manual of the American Psychological Association (APA)  and adhere to American spelling.


Please cite figures as appropriate but remember that the aim is to produce a monograph which will not “expire” in two or three years, but will rather provide an outline for thinking about national cybersecurity policy into the future through focusing on key concepts.

Contact Info: 

Dr. Mary Manjikian

Associate Professor

Associate Dean

Robertson School of Government

Regent University


Contact Email: