Authoring a research paper in Security Failures Studies.

Thank you for choosing to submit your research paper to us. These instructions will ensure we have everything required so your paper can move through peer review, production and publication smoothly. Please take the time to read and follow them as closely as possible, as doing so will ensure your paper matches the journal’s requirements.

Please make sure you have formatted your paper according to the journal’s guidelines, as described below. The Centre for Security Failures Studies publishes original, previously unpublished papers and very rarely republishes seminal works with authorisations. Manuscripts should be submitted to the journal editor, Matthieu Petrigh.

However, before submitting their manuscript, authors are encouraged to discuss the theme of their paper with the journal editor.

A typical paper length is between 8,000 and 10,000 words with each figure or table counted as 300 words. Please make sure that the text is 1.5-spaced and in 12-point Helvetica. Short biographies for all authors should be provided at the time of submission, along with contact information and an indication of the corresponding author. Submissions will not be considered until a biography is submitted.

Please note that the Centre for Security Failures Studies uses  iThenticate® software to screen papers for unoriginal material. By submitting your paper for publication into the journal Security Failure Studiesyou are agreeing to any necessary originality checks your paper may have to undergo during the peer review and production processes.

Submission of Manuscripts

Format and Presentation.  Security Failure Studies requires a main document and its related source files if a manuscript was compiled with LaTex. The format of the whole document is 21 x 29.7 cm (8.5″ x 11″ – A4), page orientation is vertical. The main document, which is used for review, must be a Word, Pages or PDF file. Please include your rendered file (Word, Pages or PDF, e.g.) and its original source file (LaTex) if necessary with your submission. Keep acronyms and abbreviations to a minimum and define those that do appear in the text. The appropriate usage of M-dashes and N-dashes would be appreciated. Footnotes are not typically used; if you need to include them, use the endnote format.

Structure. The structure of the manuscript is flexible but must be clear and should include the following: an abstract of 300-350 words, 3 to 5 keywords, an introduction, few sections and subsections, a conclusion with recommendations and a reference list.

Writing Style. Academic.

Figures, Tables, and Graphics. Upon initial manuscript submission, figures, tables, and other graphics should be included as part of the main document (embedded). All tables and figures must be mentioned in the text of a paper, and include a caption. All illustrations must be clear enough to be read when printed in black-and-white. Upon the acceptance of a manuscript, authors will be asked to submit separate art files (not embedded in text files). Digital files are recommended for highest quality reproduction and should follow these guidelines:

300 dpi or higher
sized to fit on journal page
JPEG or PNG format only

Screen shots: Save original screen shot captures in .jpg or .png format at a resolution of 300 dpi.

References. References should appear at the end of the research paper in APA style, except when shown otherwise in the examples listed here. Cite in text the author and date, separated by a comma, in parentheses: (Smith, 2005). Use an ampersand, rather than “and” for multiple authors. For works with more than one author, provide all author names for the first citation in the text: (King, Marks, & McCoy, 2002). Then use “et al.” for subsequent citations of the same work: (King et al., 2002).


Journal Article: Clarke R. V. (2004). ‘Technology, criminology and crime science’. European Journal on Criminal Policy and Research, 10: 55-63.

Book: Button M. (2008). Doing security: critical reflections and an agenda for change. Basingstone: Palgrave Macmillan.

Book Chapter: Wakefield A. (2014). ‘Where next for the professionalisation of security?’ in M. Gill (ed.) The handbook of security, Second edition, (pp. 919-35). Basingstone: Palgrave Macmillan.

Conference Proceedings: Schultz A. & Hahsler M. (2002). Software reuse with analysis patterns. In Proceedings of the 8th AMCIS, pp. 1156-1165, Dallas, TX, August 2002. Association for Information Systems.

Electronic Sources: PKF (2015). The financial cost of fraud 2015: what the latest data from around the world shows. Retrieved 24 October 2015, from

Further guidance on APA referencing  can be found here.

Journal Review Process. Once submitted, a paper undergoes an initial review by the journal editor. After a positive initial review, the paper undergoes a double-blind review process by two or more subject matter experts. Reviews are then received by the editor, who then provides the author with an editor’s report that includes the final recommendation: a conditional acceptance, a request for further revisions, or rejection.

Prior to publication, all accepted papers are edited for style and grammar by the Centre for Security Failures Studies’s editor-in-chief. The author is also requested to complete a contractual agreement. If you plan to use graphics or tables from another publication, you must secure reprint permission from the appropriate publisher. Such permission is also needed for quotes of 50 words or more, or more than 400 words of material quoted from one source. All accepted manuscripts, artworks, and photographs remain the properties of the Author but are subject to terms and conditions.

Proofs. Page proofs are sent to the corresponding author before publication. They must be carefully checked and returned within 7 days of receipt.

Complimentary Policy and Reprints. Authors for whom we receive a valid email address will be provided with a free digital copy of their own work and an opportunity to purchase reprints of individual articles, or copies of the complete print issue at production cost (plus shipping).  

Open Access.The Centre for Security Failures Studies’s Open Access provides authors or their research sponsors and founders with the option of paying a publishing fee of £149 (covering plagiarism checks and peer-review associated costs) and thereby making their research papers permanently available for free online access – Open Access – immediately on publication to anyone, anywhere, at any time. This option is made available once a research paper has been accepted in peer review. The option Open Access will work alongside a Creative Common license to be selected by the Author.

More information about Open Access can be found, for example, on Wikipedia at:

More information about Creative Commons and their licenses can be found, for example,  at:

Royalties for Authors

Publishing with the Centre for Security Failures Studies means that you will be receiving proper royalties for your hard work. Once a research paper is edited and published, its author will receive an equal share of all the royalties earned after each sale of the journal issue in which his or her research paper has been placed, whatever the format might be (paperback or e-book). The total amount of royalties earned is independently calculated by CreateSpace, a company which is part of Amazon group of companies and depends upon different factors, such as the journal issue RRP and the sales channels being used to sell the journal.

When individual research papers are sold in e-format, 75% of what is earned will be reversed to the author of the particular research paper having been sold. In this specific case, each sale is dealt with by the Centre for Security Failures Studies and royalties earned by authors are constant. For example, when a research paper is sold £4.90, the total amount reversed to its author will be £3.67.

Payments to authors are made on a quarterly basis via bank transfer or Paypal.

After Publication

Authors publishing articles with us will have, if they want, their profile displayed on our website. This profile can include a picture, a brief description, a video and a contact form linking to their own email address. Examples of profiles can be found here.


We are here to clarify doubts, if any. Please use our contact page to raise your concerns.