Ready to submit? Start a new submission or continue a submission in progress

Go to submission site (link opens in a new window)

Journal overview

Security Studies publishes leading scholarship in the field of international security, broadly construed. The journal is wedded to no particular theoretical paradigm, epistemological stance, or methodological approach. Security Studies embraces the field in all its intellectual diversity, welcoming contributions to scholarly knowledge from the plural communities and research traditions that constitute the field. Its articles provide an answer to an explanatory puzzle, present original empirical research (using a range of methods), critically engage core theoretical concepts, or otherwise intervene in disciplinary debates. Security Studies articles' analysis is rigorous in terms appropriate to their methodological approach.

Security Studies welcomes scholars from all disciplines, and its articles do not conform to narrow disciplinary norms. However, authors might find it helpful to understand what Security Studies is not . Although Security Studies articles are often motivated by policy questions and often have policy implications - and Security Studies encourages authors to spell those out - Security Studies is not a policy journal; its articles are directed primarily toward generating scholarly knowledge, rather than arguing for a particular policy. Similarly, although Security Studies has traditionally been, and remains, sympathetic to careful and deep historical research, it is not a history journal; Security Studies articles engage with historical materials to answer analytical questions and address analytically-framed debates. Articles that are purely descriptive - for instance, of a particular region's contemporary or past security challenges, of a government's decision-making process, of a historical case - will not pass muster. Articles published in Security Studies will be explicit about their central analytical pivot and be framed around those analytical questions and contributions.

A successful submission to Security Studies will generally:

  • Establish the significance of its central analytical question(s). Successful submissions will effectively articulate the article's stakes - theoretical, empirical, political, and/or normative;
  • Clearly specify the theoretical framework used for analysis, referencing the necessary literature(s);
  • Adhere to rigorous methodical standards, as understood by the intellectual tradition within which the article is situated, in setting forth the evidentiary bases of its argument;
  • Engage with work outside of its immediate field of research and approach to scholarly inquiry. Authors who publish in Security Studies are speaking to the field as a whole, not just to scholars working within their specific area and research tradition;
  • Spell out the implications of their findings for further research.

For complete guidance from the Editors, please consult the Security Studies website and especially its guidance for authors.

Peer Review Policy: All articles in this journal have undergone editorial screening and double-anonymous peer review by at least two independent referees.

Publication Office:

Taylor & Francis, Inc., 530 Walnut Street, Suite 850, Philadelphia, PA 19106



Authors can choose to publish gold open access in this journal.

Read the Instructions for Authors for information on how to submit your article.

Read full aims and scope

Explore articles

Explore the most recently published articles

Bryce Loidolt
Article |
Oriana Skylar Mastro
Article |
Danielle L. Lupton
Article |
Even Hellan Larsen
Article |
Open Access
Darren J. Lim et al.
Reply |

Latest issues

Advertise in this journal

Reach an engaged target audience and position your brand alongside authoritative peer-reviewed research by advertising in Security Studies.

Explore advertising options