GUIDELINES FOR REVIEWING ARTICLES FOR PUBLICATION IN THE ’SECURITY REVIEW’
The guidelines for reviewing articles for publication in the ‘Security Review’ are in accordance with the ‘Good Practices in the academic peer reviewing process’ published by the Ministry of Science and Higher Education.
The editors cooperate with reviewers – recognized specialists in the field of security who work with the journal as reviewers. Upon receipt of a proposal for an article and its acceptance by the topical editor, a potential reviewer is selected based upon their specialization in the field of the article. Other factors such as the reputation of the reviewer are also taken into consideration.
The potential reviewer receives an inquiry containing:
- title of the article,
- abstract of the article,
- information on the contents of the article,
- required deadline for receipt of the review,
- request for any further requirements (such as the need to deliver the source data upon which the research results of an article is based).
Reviewers are not to consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers. To review each manuscript are appointed two independent reviewers from outside the research unit affiliated by the author of the manuscript.
Articles are reviewed anonymously on both the side of the author and the reviewer (double blind review). Evaluation of the reviewed text is done using the reviewer’s form.
All articles submitted to the ‘Security Review’ are subject to verification by the UITM’s antyplagiat system.