Divergent Options is calling for papers related to national security situations with a Cyberspace nexus.
Prospective writers may address any national security situation related to Cyberspace large or small.
Please limit your article to 1,000 words and write using our article template which is designed for ease of use by both writers and readers alike.
Please send your article to firstname.lastname@example.org by May 11, 2017.
If you are not interested in writing on this topic we still welcome individual articles on virtually any national security situation an author is passionate about. Please do not let our call for papers cause you to hesitate to send us your idea. We look forward to hearing from you!
A Few Questions From Twitter Followers to Inspire Potential Writers:
What options are available for the private sector to undertake inherently governmental activities such as offensive cyber operations?
What options are available to define a “cyber act of war?”
What options are available to improve primary education to increase the preparedness of students to enter the cyber workforce?
What options are available to manage cyberspace priorities of both security and adaptability?
What options are available to prioritize and manage funding for cyberspace-related systems?
What options are available for interpreting whether Right to Protect applies in cyberspace?
What options are available to protect critical infrastructure and / or nuclear, military, intelligence and space activities from cyber attacks?
What options are available to decrease the politicization of cyberspace?
What options are available to centralize or decentralize cyberspace capabilities such as offensive cyber operations or intelligence collection?
What options are available for interpreting how the Law of Armed Conflict applies in cyberspace?
What options are available for the U.S. military to define military cyber operations across the strategic, operational, and tactical levels of war?
What options are available to ensure military forces and personnel at the brigade level and below have the cyber capabilities and cyber training they need to conduct cyber operations?
What options are available to ensure military members that conduct cyber operations are treated with the same respect as their peers who conduct traditional combat operations?