For Authors


Submission of manuscripts. 

To submit an article or a review to the Jagiellonian Security Review, authors should send the manuscript and other materials they would like to communicate to the editors to the following e-mail address: Each manuscript must be accompanied by a statement that it has not been published elsewhere and that it has not been submitted simultaneously for publication elsewhere. Authors are responsible for obtaining permission to reproduce copyrighted material from other sources and are required to sign an agreement for the transfer of copyright to the publisher. Authors are required to secure permission for the reproduction of any figure, table or extract text from any other source. This applies to direct reproduction as well as "derivative reproduction" (where a new figure or table which derives substantially from a copyrighted source).  All parts of the manuscript should be typewritten in MS Word format, double-spaced, with footnotes conforming to the Chicago Manual of Style (more in the style of referencing section) and margins of one inch on all sides. Number manuscript pages consecutively throughout the paper. Each article should be summarized in an abstract and provided with 3-5 keywords. 


The manuscript should include:

(1) a title page or cover letter including the title of the article (not exceeding 50 character spaces), the full names of the authors and academic or other professional affiliations;

(2) an abstract of 250 words maximum and keywords;

(3) the full text of the manuscript including the footnotes.

Original manuscripts should normally not exceed 40,000 character spaces (equivalent to 6,000 words) in length and be not shorter than 25,000 characters (3,500 words). Research notes should not exceed 4,000 words. Reviews should be 1,000-1,500 words in length. This includes the main text of the manuscript, footnotes, tables, figures and references. Overlength manuscripts will not be accepted and returned to the authors.

Tables and Illustrations should be submitted as separate files, with their location noted in the text. The preferred format for tables is Microsoft Excel. The preferred formats for figures are tif or jpg. Table and figure references should be in a consistent style: (e.g. Table 1 note Table One).  Captions for illustrations should be listed in a separate file.


Headings and subheadings. Type these at the left margin, using the following hierarchy: (a) upper case throughout, preceded and followed by two hard returns, (b) upper (first letter of first word) and then lower case, preceded and followed by two hard returns, (c) upper (first letter of first word) and then lower case, preceded and followed by two spaces, then text. Separate all paragraphs by two hard returns.


Proofs. PDF proofs will be sent directly to the authors by the publisher, and should be returned immediately after correction.


Editing. The editor retains the right to make minor stylistic changes to the finally accepted typescript.  Any substantial changes will be referred back first to the author.


Style of referencing. Use the Chicago Manual of Style of referencing. However, insert only footnotes. No bibliography is required.  In the case of books and chapters in books, the reference should include details of the publisher and the place and date of publication; in the case of journal articles, the references should include details of the volume and issue number of the journal, as well as the page numbers.  In the case of online source, the reference should include the URL address and the date accessed.



Books (single author):  Michael Yar. Cybercrime and Society. London - Thousand Oaks - New Delhi: SAGE Publications, 2006, p. 182.

Books (two or three authors): Steven D. Levitt and Stephen J. Dubner, Superfreakonomics: Global Cooling, Patriotic Prostitutes, and Why Suicide Bombers Should Buy Life Insurance. New York: William Morrow, 2009, pp. 66-68.

Books (more than three authors) - use the first author listed on the title page, followed by „and others”:  Sean Bodmer and others. Reverse Deception. Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill, 2012.

Edited volumes (one editor): David Boaz (ed.). Toward liberty: the idea that is changing the world. Washington, D.C.: Cato Institute, 2002.

Edited volumes (two or three editors): Victoria E. Bonnell and George W. Breslauer (eds.). Russia in the new century: stability or disorder? Boulder, Co. and Oxford: Westview Press, 2001.

Book chapter:  Kimberly Marten Zisk. Institutional Decline in the Russian Military: Exit, Voice, and Corruption. In: Victoria E. Bonnell and George W. Breslauer (eds.). Russia in the new century: stability or disorder? Boulder, Co. and Oxford: Westview Press, 2001, pp. 79-84.

Article from a journal: Javier Argomaniz. Post-9/11 institutionalisation of European Union counter-terrorism: emergence, acceleration and inertia. European Security, 2009, 18(2), pp. 151-172.

Article - two or more authors: list authors in the same order they are listed in the journal, or use “and others” for more than three authors, as for books .

Article from a magazine or a newspaper: Jon Meacham. The Stakes? Well, Armageddon, For One. Newsweek, 12 October 2009, p. 5.

Documents (printed): European Council. The Hague Programme: Strengthening Freedom, Security and Justice in the European Union. Official Journal of the European Union, C 53, 3 March 2004.

Web documents: Council of the European Union. Declaration on terrorism. 25 March 2004 [NB: If no date is given, write (No date)]. Available at: [Accessed 30 March 2004].

Electronic journals: Arunesh Sinha and others. From physical security to cybersecurity. Journal of Cybersecurity, 2015, 1(1), pp. 19-35. Available at: [Accessed 17 November 2015].

Journal articles from a web-based full-text database: Philip Giraldi. The World’s Hardest Target: United States Intelligence on Iran. Mediterranean Quarterly 2010, 21(3), pp. 14-21. Available at: [Accessed 23 January 2011].