We would like to kindly inform you that on 27/01/2021 at 9.00 am will be held (in remote mode) the 6th National Scientific Conference in the series “Information security” entitled Contemporary opportunities and challenges and threats to the information dimension of state security. Security Review is a media partner above Conference.



  1. Scientific articles submitted for publishing have to be original, topical and never been published before.
  2. Length of the article should not exced 15 pages in defined format. Microsoft Word text editor must be used for writing.
  3. Articles must be written using Times New Roman, 1.5 line spacing and follow the following form:
  • Title -14 point bold capital letters aligned to the center.
  • Full author´s (co-author´s) name with information about current workplaces and affiliation [10 point normal letters aligned to the center].
  • Abstract – 9 point normal letters, extent 3-5 lines.
  • Keywords – 9 point normal letters.
  • The article text – 12 point normal letters.
  • Reference list.
  • Contact – e-mail – 9 point normal letters at the end of the article.
  1. Title and abstract of article wrote in no-english language must be in english.
  2. Figures, graphs and tables must be included in the text and numbered and must contain description (9 point normal letters).
  3. The citations and bibliographies should be done according to the standards defined in attachment ‘Citation and reference list’.
  4. The article should be submitted in electronic form to the e-mail:
  5. The editorial board will consider submited article in the next scheduled meeting. If it decides to include the article in the next issue it submits the manuscript to the editors for review. The final version (before printing) will be sent to the author for the final revision.


  • Stoyko Stoykov, Prof. (Vassil Levski National Military University Bulgarian Armed Forces)
  • Krastyu Krastev, Ph.D. (Vassil Levski National Military University Bulgarian Armed Forces)
  • Vasile Carutasu, dr (Academia Fortelor Terestre „Nicolae Balcescu” Sibiu)
  • Ghita Barsan, Ph.D. (Nicolae Bălcescu Land Forces Academy, Sibiu)
  • Jozef Matis, prof. nadzw. dr hab. (The Armed Forces Akademy, Liptovsky Mikulas, Slovakia)
  • Greg Simons, dr (Swedish Defence University)
  • Stanisław Pieprzny, prof. zw. dr hab. (Uniwersytet Rzeszowski)
  • Tomasz Bąk, prof. nadzw. dr hab. (Wyższa Szkoła Informatyki i Zarządzania w Rzeszowie)
  • Włodzimierz Fehler, prof. nadzw. dr hab. (Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach)
  • Magdalena El Ghamari, dr (Uniwersytet w Białymstoku)
  • Tomasz Aleksandrowicz, prof. nadzw. dr hab. (Wyższa Szkoła Policji w Szczytnie i Akademia Humanistyczna im. Aleksandra Gieysztora)
  • Stanisław Lipski, dr inż. (Instytut Mechaniki Precyzyjnej)
  • Julian Maj, dr hab. (Państwowa Wyższa Szkoła Zawodowa w Suwałkach)
  • Jerzy Stańczyk, prof. nadzw. dr hab. (Wojskowa Akademia Techniczna w Warszawie, Zakład Bezpieczeństwa Narodowego)
  • Bogusław Jagusiak, prof. zw. dr hab. (Wojskowa Akademia Techniczna w Warszawie, Zakład Bezpieczeństwa Narodowego)
  • Jerzy Zalewski, prof. nadzw. dr hab. (Wojskowa Akademia Techniczna w Warszawie, Zakład Bezpieczeństwa Narodowego)
  • Wiesław Śmiałek, dr (Wojskowa Akademia Techniczna w Warszawie, Zakład Bezpieczeństwa Narodowego)
  • Krzysztof Radecki, dr



The guidelines for reviewing articles for publication in the ‘Security Review’ are in accordance with the ‘Good Practices in the academic peer reviewing process’ published by the Ministry of Science and Higher Education.

The editors cooperate with reviewers – recognized specialists in the field of security who work with the journal as reviewers. Upon receipt of a proposal for an article and its acceptance by the topical editor, a potential reviewer is selected based upon their specialization in the field of the article. Other factors such as the reputation of the reviewer are also taken into consideration.

The potential reviewer receives an inquiry containing:

  • title of the article,
  • abstract of the article,
  • information on the contents of the article,
  • required deadline for receipt of the review,
  • request for any further requirements (such as the need to deliver the source data upon which the research results of an article is based).

Reviewers are not to consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers. To review each manuscript are appointed two independent reviewers from outside the research unit affiliated by the author of the manuscript.

Articles are reviewed anonymously on both the side of the author and the reviewer (double blind review). Evaluation of the reviewed text is done using the reviewer’s form.

All articles submitted to the ‘Security Review’ are subject to verification by the UITM’s antyplagiat system.