Citation and Referencing Style
2010 • X • 7
This resource provides a style for citing and referencing works in scientific papers. It is primarily intended for my master’s and doctoral students. The style aligns with conventions in the field of Information Systems, clearly favoring the author-date style while maintaining a typographically light appearance—without veering into minimalist extremes.
Under the Citation section, you will find examples of various citations formats (do not be surprised by the use of square brackets instead of parentheses—I believe there are strong enough typographic reasons for this choice).
Under the Referencing section, examples of references are provided—organized alphabetically—covering a wide range of work types. These samples should address the majority of common referencing scenarios.
... the occurrence of security incidents [Garg 2003].
... to achieve a satisfactory level of security [Dhillon and Backhouse 1997;
Kankanhalli et al. 2003; King et al. 2001].
Already in 1991, Goodhue and Straub [1991] noted the diminutive...
... by the Theory of Action [Argyris and Schön 1974].
... aggregates of individuals advanced by Ouchi [1980], up to the conception of Falkenberg et al. [1998], for whom...
Allen, J., D. Gabbard and C. May (2003). Outsourcing Managed Security Services. Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
van Aken, J. E. (2004). Management Research Based on the Paradigm of the Design Sciences: The Quest for Field-Tested and Grounded Technological Rules. Journal of Management Studies 41(2), 219–224.
Clarke, R. (2006). Whats Privacy? http://www.rogerclarke.com/DV/Privacy.html (Retrieved 8 January 2007)
Fischhoff, B., S. Lichtenstein, P. Slovic, S. L. Derby and R. L. Keeney (1981). Acceptable Risk. Cambridge: Cambridge University Press.
Hare, C. (2004). Policy Development. In Tipton, H. F. and M. Krause (Eds.), Information Security Management Handbook, fifth edition, 925–944. Boca Raton: Auerbach.
Kelly, P. (2003). Managing Risk in the Telecomms Industry: Improving the Quality of Decision Making. PhD Dissertation. University of Manchester, Manchester.
McLean, K. (1992). Information Security Awareness—Selling the Cause. Proceedings of the IFIP TC11 Eighth International Conference on Information Security. Amsterdam, 179–193. Elsevier.
Silverman, D. (2000). Doing Qualitative Research: A Practical Handbook. London: SAGE Publications.
Stanton, N. (1990). Communication, second edition. London: Palgrave/Macmillan.
Zviran, M. and W. J. Haga (1999). Password Security: An Empirical Study. Journal of Management Information Systems 15(4), 161–185.
© 2025– Filipe de Sá-Soares. All rights reserved.