Submissions
Submission Preparation Checklist
As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.- The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
- The submission file is in OpenOffice, Microsoft Word, or RTF document file format.
- Where available, URLs for the references have been provided.
- The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
- The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.
National and State Security Studies
Covers:
K1;
K3.
Topics:
national security;
strategic planning;
hybrid threats;
security policy;
critical infrastructure;
energy security;
economic security;
humanitarian security;
international security;
state resilience.
Border and Migration Security
Covers:
K2.
Topics:
border security;
integrated border management;
migration security;
cross-border threats;
smuggling;
irregular migration;
maritime security;
border control.
InformatioInformation and Cyber Security
Covers:
K4;
F5.
Topics:
cybersecurity;
cyberdefense;
information protection;
OSINT;
information operations;
cognitive warfare;
information security management;
cyber resilience;
AI security;
Military Management and Defence Support
Covers:
K5;
K6.
Topics:
military management;
defense planning;
logistics;
resource management;
medical support;
logistics support;
personnel support;
operational management;
capability-based planning;
interoperability with NATO.
Defence Technologies and Military Systems
Covers:
K7.
Topics:
weapons;
military equipment;
UAVs;
air defense systems;
autonomous systems;
C4ISR;
robotic complexes;
military information systems;
combat systems modeling;
defence innovation.
Civil Protection and Emergency Security
Covers:
K8;
K10.
Topics:
civil security;
civil protection;
fire safety;
technogenic safety;
disaster management;
crisis response;
resilience;
emergency management;
radiation safety;
environmental safety in wartime.
Copyright Notice
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).
Privacy Statement
Privacy Policy
This Privacy Policy defines the procedures for the collection, use, storage, and protection of personal data of users of the journal “Social Development and Security”, including authors, reviewers, editors, and other individuals interacting with the Journal.
1. General Provisions
The Journal adheres to the requirements and principles of:
- the General Data Protection Regulation (GDPR, Regulation (EU) 2016/679);
- the Committee on Publication Ethics (COPE);
- international open access standards (DOAJ, OASPA).
2. Data Controller
The data controller is the Editorial Office of the journal “Social Development and Security”.
Contact for data protection inquiries: tim68@ukr.net
3. Categories of Personal Data
The Journal may collect and process the following personal data:
- full name (first name, last name, patronymic if applicable);
- affiliation (place of work or study);
- email address;
- ORCID ID;
- research interests;
- professional information: role in the Journal, submission and review history;
- technical data: IP address, cookies, system access metadata.
4. Purpose of Data Processing
Personal data are processed exclusively for the following purposes:
- ensuring the editorial process: submission, peer review, editing, and publication;
- communication with authors, reviewers, and editors;
- indexing and dissemination of scientific publications;
- ensuring the quality of peer review;
- compliance with legal obligations;
- prevention of academic misconduct.
5. Legal Basis for Processing
Personal data are processed on the following legal grounds:
- consent of the data subject — Article 6(1)(a) GDPR;
- performance of a contract (publishing agreement) — Article 6(1)(b) GDPR;
- legitimate interest (ensuring the quality of scientific communication) — Article 6(1)(f) GDPR;
- compliance with legal obligations — Article 6(1)(c) GDPR.
6. Confidentiality in the Editorial Process
The Journal ensures the confidentiality of:
- manuscripts at all stages of the editorial process;
- personal data of authors and reviewers;
- reviewers’ comments and recommendations.
The Editorial Office does not disclose information about manuscripts, including their status, content, and peer review results, to third parties without a legal basis.
7. Disclosure and Data Transfer
Personal data may be shared with:
- members of the Editorial Board;
- reviewers within the peer review process;
- indexing databases and services (e.g., DOAJ, Crossref, Google Scholar, OUCI);
- technical providers and platforms supporting the Journal (e.g., OJS).
Data are transferred only to the extent necessary to achieve the stated purposes.
8. Data Retention
Personal data are retained:
- for the period necessary to fulfill editorial, scientific, and legal purposes;
- until consent is withdrawn, unless retention is required by law.
Published materials, including author data, may be retained indefinitely as part of the Journal’s scholarly archive.
9. Data Protection Measures
The Journal applies appropriate technical and organizational measures, including:
- access control to the editorial system;
- use of secure servers;
- restricted access to personal data;
- regular security monitoring.
10. Rights of Data Subjects
Users have the right to:
- access their personal data;
- request correction of inaccurate data;
- request deletion of personal data (“right to be forgotten”);
- restrict data processing;
- object to data processing;
- receive data in a structured format (data portability);
- withdraw consent at any time.
To exercise these rights, please contact the Editorial Office.
11. Cookies and Technical Data
The Journal may use cookies and similar technologies to:
- ensure website functionality;
- collect statistical data;
- improve user experience.
Users can adjust cookie settings in their browser.
12. Policy Regarding Minors
The Journal does not intentionally collect personal data from individuals under the age of 18.
13. Policy Updates
The Journal reserves the right to update this Privacy Policy. The updated version will be published on the official website.
14. Contact Information
For all inquiries related to personal data protection, please contact: tim68@ukr.net
Note: The Journal processes personal data only to the extent necessary to support the editorial process, scientific communication, and compliance with legal obligations.










