Editorial Policy of Internal Security
Internal Security publishes scientific articles, research reports and other studies on the scientific exploration of security problems, in particular the following issues: theory and methodology of security research, security management, cyber security, combating terrorism and organised crime, criminology, forensic science, security by design, international cooperation in the field of internal security, law, history of internal security and modern technologies used in ensuring internal security, as well as reviews of scientific works related to security and reports on scientific undertakings important for security research.
Internal Security acts in accordance with the Committee on Publication Ethics (COPE) Code of Conduct.
The research described in submitted manuscripts that involves human subjects, including healthy volunteers, must adhere to the principles of the European Convention of Bioethics. Research involving animals must adhere to the European Convention for the Protection of Vertebrate Animals Used for Experimental and other Scientific Purposes. All investigations involving humans or animals submitted for publication in Internal Security must be conducted in conformity with these principles. In addition, all investigations involving humans or animals must be approved by an appropriate institutional review committee.
Authors should ensure that they have written entirely original works, and if they have used the work or words of others, that this has been appropriately cited or quoted. Plagiarism in all its forms constitutes unethical publishing behavior and is unacceptable. In cases of alleged or proven scientific unreliability, fraudulent publication or plagiarism, the publisher shall, in close cooperation with the editor of the journal, take all appropriate measures to clarify the situation and amend an article. To verify originality, submitted manuscripts are checked by the originality detection service Strikeplagiarism.com
Ghostwritten manuscripts will be rejected. Authorship should be limited to those who have made a significant contribution to the conception, design, execution, or interpretation of the submitted manuscript. All those who have made significant contributions should be listed as co-authors. Where there are others who have participated in certain substantive aspects of the submitted manuscript, they should be acknowledged or listed as contributors.
Conflict of Interest
Authors are requested to disclose any actual or potential conflict of interest including any financial, personal or other relationships with other people or organizations that could inappropriately influence, or be perceived to influence, their work.
Submitted manuscripts must include disclosure of all relationships that could be viewed as presenting a potential conflict of interest. The Internal Security publisher may use such information as a basis for editorial decisions and may publish such disclosures if they are believed to be important to readers in judging the manuscript.
Copyright Transfer Statement
The copyright to the submitted article is transferred to the publisher of the Internal Security effective if and when the article is accepted for publication. The copyright transfer covers the exclusive right and license to reproduce, publish, distribute and archive the article in all forms and media of expression now known or developed in the future, including reprints, translations, photographic reproductions, electronic form (offline, online) or any other reproductions of similar nature.
The procedures leading to the selection of articles for publication in IS journal require that no text be accepted until it has been pre-assessed by the topical editor, the editor-in-chief (or their deputy) and two reviewers. The author's name and authentication data are removed before submitting the material to a reviewer in order to maximize objectivity and ensure that the material is evaluated solely on the basis of its content and work input, with particular emphasis on research methodology and substantive value.
All published materials are protected by copyright by the Police Academy in Szczytno, subject to the right to be used in the future. This does not limit the author's right to use his own materials or include them in future works, provided that they are indicated as an earlier publication of the Police Academy in Szczytno.
The editor-in-chief is responsible for the content of Internal Security and has the final authority to accept all manuscripts. However, the editor-in-chief must follow the guidelines and respond to the recommendations of reviewers. The editor-in-chief and topical editors prevent the occurrence of conflicts of interest. Unpublished articles or their fragments may not be used in the editorial team's or reviewers' research without the author's written consent.
Reviewers are appointed by the editor-in-chief from among experts in given fields. All reviews will benefit from a double anonymous review procedure. Only the editor-in-chief and the secretary know the identity of the author and reviewers. The editor-in-chief has the final authority to accept or reject any article.The secretary checks the application for compliance with the Rules for submitting materials to Internal Security and passes them to the editor-in-chief. All materials are evaluated for their contribution to the development of science and/or practice and compliance with the rules of scientific work. Submitted materials are checked by originality detection service strikeplagiarism.com. The editor-in-chief or secretary selects reviewers. The editor-in-chief or secretary checks negative reviews and notifies the authors about it. Reviews and materials for publication are submitted to the editorial office, which summarizes the reviews, evaluates the material and passes comments and decisions on the publication to the authors.
Manuscript Submission Guidelines
|A research paper should not exceed 25 standard typed pages (1800 characters per page: 30 lines per page, 60 characters per line), articles – 20 pages, discussions, materials and documents – 10 pages, reviews, reports and commentaries – 3 typed pages.|
|Research works should be divided into background, material and methods, results, discussion, conclusions, references. Research papers, articles, materials and documents, as well as commentaries on court decisions should be preceded by an abstract, not exceeding half of a standard page (200-250 words) and having a structured form, i.e. reflect structure of an article (background, material and methods, results, conclusion), followed by 3-5 keywords. Keywords should not repeat the title of the manuscript.|
|Materials published in Internal Security are peer reviewed.|
|The Editor reserves the right to abridge and edit submitted texts, as well as to change their titles.|
|Articles which have not been ordered are not returned to their authors.|
|Articles submitted should not have been published previously. Submissions should be sent in electronic format via e-mail or on disk as Microsoft Word or Rich Text Format documents.|
|Submissions should include Author information: name and surname, title/s, place of work, postal and e-mail address and telephone number. Academics are asked to indicate their parent school.|
|Submissions should include a statement that the article has not been previously published and that it has not been simultaneously submitted for publication elsewhere.|
|If notes to the texts are used, footnotes are used rather than endnotes. Information on the cited source includes:|
|for books – complete last name, initial(s) of first name(s), title of the book, place and year of publication;|
|for articles - complete last name, initial(s) of first name(s), title of the article, title of the journal, year of publication, volume number and page number.|
|If the reference list to the text is used, it should be in alphabetical order by author name. If there are two articles by the same author, then the author's name is again written in full. If there are two or more articles by the same author, then they should be ordered according to year, with the most recent appearing first. If there are two or more articles with the same author and same year, then they should be ordered alphabetically by title.|
|If graphics to the texts are used, they should be submitted in conjunction with manuscript file(s). A PDF or a hard copy of all graphics files is required.|
|Commentaries on court decisions should include the thesis of the ruling and place of publication. Unpublished court decisions and adjudication thesis formulated by the author of the commentary should be clearly indicated as such.|
|Words and phrases of foreign origin (e.g. prima facie, de lege lata) should be italicized, while quotations should be placed in inverted commas.|
|Materials and documents for publication should be submitted in English. The Editorial Team accept also texts in Polish, German, French and Russian and provide translation in English. However texts submitted in English will be preferred over others.|
|Authors do not receive any fee for publishing in Internal Security.|
To create an account and submit your manuscript, please click the following link:
Create new account:
To log in to your account and manage your manuscripts, please click the following link: