PUBLICATION ETHICS AND EVALUATION PROCESS
The Journal of Security Strategies adopts the principle of not accepting any action, which is in conflict with scientific research and publication ethics. The Journal uses double-blind peer-review evaluation system. It is published electronically quarterly, in March, June, September, and December. The Journal does not charge any fees for published articles. The ethical principles and publication policy are written by taking into account the guidelines and policies of the Committee on Publications Ethics (COPE).
Relations with the Authors
By sending their manuscript to the Journal of Security Strategies, the author declares and undertake that their work is original and genuine and that their manuscript have not been published completely or partially elsewhere or are not in the publication process elsewhere. Manuscripts violating the legal and academic criteria such as copyright and/or plagiarism including the above criteria are not evaluated and those manuscripts, which are found to be violate these criteria during the evaluation process, are rejected promptly.
Manuscripts presented to the Journal are first reviewed by the editors in accordance with the abovementioned criteria and publication principles. The manuscripts which are deemed to comply with these criteria or publication principles are returned to the author by putting forth the necessary corrections to be made or directly rejected. The rejection decision at this stage of the process may be taken due to the fact that the manuscript does not comply with the publication ethics and principles of the Journal, the manuscript does not comply with the writing rules of the Journal, the manuscript is out of the scope of the Journal and/or the manuscript does not have the academic qualifications to be published in the Journal of Security Strategies.
Authors, who send articles in a foreign language to the Journal, are obliged to get their work proof-read by a native speaker academic who is considered as an expert on their field and to provide an evidence of this proof-reading. The proof-reading process may also be carried out by the editors of the Journal by out-sourcing a native speaker, provided that the payment for proof-reading is paid by the author.
The authors whose articles have been published in the Journal of Security Strategies are considered as natural peer-reviewers of the Journal and they are obliged to perform a peer-review at least once upon the request of the Editors.