Our editorial office will not return manuscripts or other materials that have not been ordered or commissioned. All decisions made with regard to publishing a given manuscript are contingent upon the judgments made by the editorial team, and the assessment of reviewers. We reserve the right to modify or alter the titles and abridge the volume of the manuscripts submitted for printing.
Please note that our editorial office will not accept manuscripts that have not been prepared in accordance with the Instruction for Authors. This rule also applies to the review process.
The declaration of the authenticity of the text (paper) has to be filled in, signed and scanned, and then sent (in pdf or jpg file):
It is also possible to submit manuscripts of papers that deal with historical issues, which will be featured in the “From the History” section as well as “Reviews”.
The guidelines below provide the basic rules that have to be followed in oder to accurately prepare manuscripts to be submitted for publication in “Security. Theory and Practice” journal. Please make sure to adhere to these rules.
1. The file with the article text (Microsoft Word file: .doc or .docx) should also contain:
– author’s degree/academic title,
– author’s affiliation,
– author’s ORCiD identifier,
– author’s e-mail address (not published),
– bibliography,
– article title, abstract (up to 1000 characters with spaces) and keywords (3-7) in English.
2. The paper’s length should not exceed 20–30 thousand characters with spaces (with footnotes and bibliography).
3. Font size 11 point, Times New Roman, interspace 1,5 lines.
4. Foreign language terms, expressions and titles of papers, books or other sources should be italicised. Please refrain from using bold fonts or underscores. Please use abbreviations (such as e.g., i.e., etc, and others) consistently throughout the paper.
5. The introduction should briefly place the study in a broad context and highlight why it is important. It should define the purpose of the work and its significance.
Images, illustrations, and other visual elements
Images, drawings, charts/graphs and photographs should be sent by e-mail in a scanned form, or as an electronic file (300 dpi) in one of the following formats: *.jpg *.bmp, *.tif, or *.psd. Illustrations taken from other sources and subjected to copyright should be accompanied by relevant bibliographic information, placed in the caption of a given drawing.
Graphs, charts, and tables
Authors should make sure all the tables, charts and graphs are properly numbered. Please refrain from using colours in them.
Font: headings, subheadings, and main text in the table – size 10.
Title (label)
Charts/graphs: Captions ought to be placed below charts; in the case of tables, titles should be placed above them.
The title “inside” a chart can only be applied if it introduces something new, and is not a repetition of the caption already put under the drawing.
Source: a full source must be provided under each table and chart/graph. Authors are allowed to also indicate a mention of contractual data, their own elaboration, or their own elaboration on the basis of an external source.
Additional explanations: below a drawing (or inside a table), Authors should put some additional information necessary to understand its content.
Anticipation: the use of each table or chart/graph ought to be duly anticipated in the main text of the paper by means of a full-blown sentence, which allows to locate the table or graph/chart in a place that is convenient for the author and the editorial office.
Footnotes
Authors should use footnotes: font size of 8–9.
In order to indicate repetitions, Latin terminology should be applied: op. cit., ibidem, idem, or eadem. The address of the website referred to should be followed by the date of access (dd.mm.yyyy format).
The DOI identifier should be given (in case the publication has one); where a publication has been downloaded from the Interntet and does not have DOI, a relevant URL address and date of access ought to be provided.
Examples of footnotes:
– Books (single author, multiple authors, no author, edited work)
H. Morgenthau, Politics Among Nations: The Struggle for Power and Peace, Alfred A. Knopf Inc., New York 1973, p. 27.
W. Goode, Dictionary of Trade Policy Terms, Cambridge University Press, Cambridge 2003, p. 302.
J. Baylis, S. Smith, P. Owens, The Globalization of World Politics: An Introduction to International Relations, Oxford University Press, New York, NY 2007, pp. 132–139.
The Cambridge Companion to Postmodernism, Cambridge University Press, Cambridge 2004, p. 88.
K. Żukrowska, Konkurencyjność systemowa w procesie transformacji. Przykład Polski, [in:] Konkurencyjność gospodarki Polski w dobie integracji z Unią Europejską i globalizacji, vol. 1, eds. J. Bossak, W. Bieńkowski, Szkoła Główna Handlowa, Warszawa 2001, p. 83.
R.A. Landes, Orientalism as Caliphator Cognitive Warfare: Consequences of Edward Said’s Defense of the Orient, [in:] Handbook of Research on Contemporary Approaches to Orientalism in Media and Beyond, vol. 1, eds. I. Tombul, G. Sari, IGI Global, Hershey, PA 2021, pp. 33–52, https://doi.org/10.4018/978-1-7998-7180-4ch003.
– Journal articles (single author, numerous authors) and online newspapers
K. Podemski, Społeczeństwo obywatelskie w Polsce 25 lat po wielkiej zmianie, “Ruch Prawniczy, Ekonomiczny i Socjologiczny” 2014, vol. LXXVI, no. 2, p. 90, https://doi.org/10.14746/rpeis.2014.76.2.8.
W. Repetowicz, Broń “D” jako zagrożenie asymetryczne, “Wiedza Obronna” 2018, no. 21, pp. 107–125, http://wiedzaobronna.edu.pl/index.php/wo/article/view/21/18 [accessed: 8.05.2022].
P. Turchin, J.M. Adams, T.D. Hall, East-West Orientation of Historical Empires, “Journal of World-Systems Research” 2006, vol. 12, no. 2, pp. 222–225.
T. McClure, ’A matter of time’: New Zealand’s foreign minister warn China ‘storm’ could be coming, “The Guardian”, 24.05. 2021, https://www.theguardian.com/world/2021/may/25/a-matter-of-time-new-zealands-foreign-minister-warns-china-storm-could-be-coming [accessed: 18.03.2022].
– Websites
J. Ciślak, Nowe plany, struktury i niewiele dostaw. Modernizacja Sił Zbrojnych RP w 2021 roku, Defence24.pl, 29.12.2021, https://defence24.pl/sily-zbrojne/podsumowanierealizacji-plan-modernizacji-technicznej-w-2021-roku [accessed: 20.03.2022].
– Pieces of legislation
Konstytucja Rzeczypospolitej Polskiej z dnia 2 kwietnia 1997 r., Dz.U., 1997, no. 78, item 483.
Ustawa z dnia 11 marca 2022 r. o obronie Ojczyzny, Dz.U., 2022, item 655, https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20220000655 [accessed: 2.04.2022].
– Other documents
Strategia Bezpieczeństwa Narodowego Rzeczypospolitej Polskiej 2020, Warszawa 2020, BBN, https://www.bbn.gov.pl/ftp/dokumenty/Strategia_Bezpieczenstwa_Narodowego_RP_2020.pdf [accessed: 16.03.2022].
References
At the end of a paper, a detailed list of publications should be provided in an alphabetical order in the “References” section. If several publications by the same author have been used as reference, the items on the list of references should be arranged chronologically. Please do not number the individual bibliographical items.
All the items in the bibliography should not be grouped according to their types (e.g. monographs, press, Internet, etc.);
The DOI identifier should be given (in case the publication has one); where a publication has been downloaded from the Interntet and does not have DOI, a relevant URL address and date of access ought to be provided;
Examples:
– Books
Chander P., Game Theory and Climate Change, Columbia University Press, New York, NY 2018.
Baylis J., Smith S., Owens P., The Globalization of World Politics: An Introduction to International Relations, Oxford University Press, New York, NY 2007.
Grieco J., Realist International Theory and the Study of World Politics, [in:] New Thinking in International Relations Theory, eds. M. Doyle, J. Ikenberry, Westview Press, Boulder, Colo. 1997, pp. 163–201.
– Articles in journals and online newspapers
Aliriza B., Turks Have an Unavoidable War To Fight Against Corruption, “The New York Times”, 16.03.2021, https://www.nytimes.com/2001/03/16/opinion/IHT-turks-have-anunavoidable-war-to-fight-against-corruption.html [accessed: 1.04.2021].
Cook D.J., Mulrow C.D., Haynes R.B., Systematic Reviews: Synthesis of Best Evidence for Clinical Decisions, “Annals of Internal Medicine” 1997, vol. 126, issue 5, pp. 376–380, https://doi.org/10.7326/0003-4819-126-5-199703010-00006.
Fijałkowski Ł., Teoria sekurytyzacji i konstruowanie bezpieczeństwa, “Przegląd Strategiczny” 2012, no. 1, pp. 34–38.
Repetowicz W., Broń “D” jako zagrożenie asymetryczne, “Wiedza Obronna” 2018, no. 21, pp. 107–125, http://wiedzaobronna.edu.pl/index.php/wo/article/view/21/18 [accessed: 8.05.2022].
Surówka A., Prawo dostępu do informacji publicznej w orzecznictwie sądów administracyjnych, “Przegląd Prawa Konstytucyjnego” 2013, no. 3, p. 147–171, https://doi.org/10.15804/ppk.2013.03.07.
Walt S., Alliance Formation and the Balance of World Power, “International Security” 1985, vol. 9, no. 4, pp. 3–43.
– Pieces of legislation
Konstytucja Rzeczypospolitej Polskiej z dnia 2 kwietnia 1997 r., Dz.U., 1997, no. 78.
Ustawa z dnia 27 kwietnia 2001 r. Prawo ochrony środowiska, Dz.U., 2001, item 627.
– Other documents
Strategia Bezpieczeństwa Narodowego Rzeczypospolitej Polskiej 2020, Warszawa 2020, BBN, https://www.bbn.gov.pl/ftp/dokumenty/Strategia_Bezpieczenstwa_Narodowego_RP_2020.pdf [accessed: 16.03.2022].
– Websites
524 miliardy złotych na modernizację Wojska Polskiego do 2035 roku, Ministerstwo Obrony Narodowej, 10.10.2019, https://www.gov.pl/web/obrona-narodowa/524-miliardyzlotych-na-modernizacje-wojska-polskiego-do-2035-roku [accessed: 19.03.2022].
M. Chądzyński, Wzrost wydatków na wojsko. Wszystko co trzeba wiedzieć o finansowaniu armii, 300Gospodarka, 3.03.2022, https://300gospodarka.pl/explainer/wzrost-wydatkowna-wojsko-wszystko-co-trzeba-wiedziec-o-finansowaniu-armii [accessed: 10.04.2022].
Scientific reviews
Authors writing scientific-reviews are required to provide a scanned cover of the reviewed publication (it can be in a grey scale), as well as to include the following data in the review header: the author and title of the book (or its editor), the translator, the name of the publishing house, the place and year of publication, and the number of pages. In the case of foreign-language publications, a translation of their title is welcome.
Basic principles of reviewing publications in journals
1. At least two independent reviewers from outside a given academic unit shall be appointed to evaluate each publication.
2. The recommended solution is to adopt a model whereby the author(s) and reviewers do not know their identities (the so-called “double-blind review process”).
3. Based on other solutions, the reviewer shall sign a declaration of there being no conflict of interest; a conflict of interest is considered to occur between the reviewer and the author in the following cases:
a) direct personal relations (kinship, legal relationships, other conflicting relations),
b) relationships based of professional subordination,
c) direct scientific cooperation for the last two years preceding the preparation of the review.
4. The review must be prepared in writing and finish with an unequivocal conclusion as to whether a given paper should be allowed for publication, or rejected.
5. The rules for qualifying or rejecting publications and any review form are made public on the journal’s website, or in each issue of the journal.
6. The names of reviewers of individual publications/issues are not disclosed. Once a year, the journal shall feature a list of cooperating reviewers.
Out of concern for academic integrity and the overall quality of published papers, the editorial board and the publishing house operate specific procedures geared towards preventing cases of ghost-writing. Both ghost-writing and guest authorship are examples of gross academic misconduct.
Ghost-writing occurs when the author (or co-author) of a publication has made a major contribution to its coming into being and yet does not reveal his/her participation as one of the legitimate authors thereof, or his/her role is not mentioned in the credits and acknowledgements section of the book.
As far as guest authorship is concerned, in spite of the fact that an individual has been mentioned as the author or co-author of a given publication, his/her actual role in the creation process is minor or none.
Please note that any identified case of ghost-writing and/or guest authorship shall be made public, and the relevant authorities will be notified without delay. In addition, all manifestations of academic misconduct will be duly documented for legal reasons.
© BEZPIECZEŃSTWO. TEORIA I PRAKTYKA. OFICYNA WYDAWNICZA AFM