Cita­tion and Ref­er­enc­ing Style

2010 • X • 7

This resource pro­vides a style for cit­ing and ref­er­enc­ing works in sci­en­tific papers. It is pri­mar­ily intended for my mas­ter’s and doc­toral stu­dents. The style aligns with con­ven­tions in the field of Infor­ma­tion Sys­tems, clearly favor­ing the author-date style while main­tain­ing a typo­graph­i­cally light appear­ance—with­out veer­ing into min­i­mal­ist extremes.

Under the Cita­tion sec­tion, you will find exam­ples of var­i­ous cita­tions for­mats (do not be sur­prised by the use of square brack­ets instead of paren­the­ses—I believe there are strong enough typo­graphic rea­sons for this choice).

Under the Ref­er­enc­ing sec­tion, exam­ples of ref­er­ences are pro­vided—orga­nized alpha­bet­i­cally—cov­er­ing a wide range of work types. These sam­ples should address the major­ity of com­mon ref­er­enc­ing sce­nar­ios.

Citation

... the occur­rence of secu­rity inci­dents [Garg 2003].

... to achieve a sat­is­fac­tory level of secu­rity [Dhillon and Back­house 1997;
Kankan­halli et al. 2003; King et al. 2001].

... devel­op­ment ofover-for­mal­ized, acon­tex­tual and ahis­tor­i­cal solu­tions” [Dhillon 2001, p. 4].

Already in 1991, Good­hue and Straub [1991] noted the diminu­tive...

... by the The­ory of Action [Argyris and Schön 1974].

... aggre­gates of indi­vid­u­als advanced by Ouchi [1980], up to the con­cep­tion of Falken­berg et al. [1998], for whom...

Lyyti­nen [1985, p. 61] pro­vides another under­stand­ing by pro­pos­ing that infor­ma­tion sys­tems arelin­guis­tic com­mu­ni­ca­tion sys­tems”.

Referencing

Allen, J., D. Gab­bard and C. May (2003). Out­sourc­ing Man­aged Secu­rity Ser­vices. Soft­ware Engi­neer­ing Insti­tute, Carnegie Mel­lon Uni­ver­sity, Pitts­burgh.

van Aken, J. E. (2004). Man­age­ment Research Based on the Par­a­digm of the Design Sci­ences: The Quest for Field-Tested and Grounded Tech­no­log­i­cal Rules. Jour­nal of Man­age­ment Stud­ies 41(2), 219–224.

Clarke, R. (2006). Whats Pri­vacy? http://www.rogerclarke.com/DV/Pri­vacy.html (Retrieved 8 Jan­u­ary 2007)

Fis­chhoff, B., S. Licht­en­stein, P. Slovic, S. L. Derby and R. L. Keeney (1981). Accept­able Risk. Cam­bridge: Cam­bridge Uni­ver­sity Press.

Hare, C. (2004). Pol­icy Devel­op­ment. In Tip­ton, H. F. and M. Krause (Eds.), Infor­ma­tion Secu­rity Man­age­ment Hand­book, fifth edi­tion, 925–944. Boca Raton: Auer­bach.

Kelly, P. (2003). Man­ag­ing Risk in the Telecomms Indus­try: Improv­ing the Qual­ity of Deci­sion Mak­ing. PhD Dis­ser­ta­tion. Uni­ver­sity of Man­ches­ter, Man­ches­ter.

McLean, K. (1992). Infor­ma­tion Secu­rity Aware­ness—Sell­ing the Cause. Pro­ceed­ings of the IFIP TC11 Eighth Inter­na­tional Con­fer­ence on Infor­ma­tion Secu­rity. Ams­ter­dam, 179–193. Else­vier.

Sil­ver­man, D. (2000). Doing Qual­i­ta­tive Research: A Prac­ti­cal Hand­book. Lon­don: SAGE Pub­li­ca­tions.

Stan­ton, N. (1990). Com­mu­ni­ca­tion, sec­ond edi­tion. Lon­don: Pal­grave/Macmil­lan.

Zvi­ran, M. and W. J. Haga (1999). Pass­word Secu­rity: An Empir­i­cal Study. Jour­nal of Man­age­ment Infor­ma­tion Sys­tems 15(4), 161–185.