Guidelines for adding Bibliography entries: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
 
(21 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{Header_Message|message=This page is undergoing revision, thank you for your patience.}}
The available types of BibTeX entries and fields are documented at [http://en.wikipedia.org/wiki/BibTeX http://en.wikipedia.org/wiki/BibTeX].
==Naming Convention for Entries==
 
Do not use BibTeX's automatic "*" entry naming.
 
The naming convention we are using for entries is:
 
<''last name''>_F[M]:<''year''>
 
Where <last name> is the primary author's last name, F = first initial and M is an optional middle initial.  If there are  more than one reference in a year, subsequent ones are labeled with the date plus a sequence letter. (e.g, Duncan_M:2009; Duncan_M:2009A, etc.)


The naming convention for entires is:
If two authors use <''last name 1''>_<''last name 2''>:<''year''>  (e.g., Thomas_Martin:2006).


<last name>_F[M]:<year>
If more than two authors use <''last name 1''>_et_al:<''year''> (e.g., Schmitt_et_al:2004).


Where <last name is the primary author's last name, F = first initial and M is an optional middle initial.  If there are  more than one reference in a year, subsequent ones are labeled with the date plus a sequence letter, e.g, Duncan_M:2009; Duncan_M:2009A, etc.
For institutional authors use initials (e.g., DOD:2009 = Department of Defense 2009 article)


If two authors use <last name 1>_<last name 2>:<year>  (e.g., Thomas_Martin:2006).
==Journal Names==


If more than two authors use <last name 1>_et_al:<year> (e.g., Schmitt_et_al:2004).
Journal names should not be abbreviated in BibTeX. However, the full citation in individual references should conform to Bluebook standards, including abbreviations.


For institutional authors use initials (i.e. DOD:2009 = Department of Defense 2009 article)
==Links to Articles and References==


Where possible include a '''url =''' entry pointing to a location where the reference may be found.  If a second location is available use the '''alturl =''' key.  Chose the location most likely to be persistent over time for the '''url =''' key.  IF an SSRN entry is available use the '''SSRN =''' key.
Where possible include a '''url =''' entry pointing to a location where the reference may be found.  If a second location is available use the '''alturl =''' key.  Chose the location most likely to be persistent over time for the '''url =''' key.  IF an SSRN entry is available use the '''SSRN =''' key.
==Reference Types (with Examples)==
The available types of BibTeX entries and fields are documented at [http://en.wikipedia.org/wiki/BibTeX http://en.wikipedia.org/wiki/BibTeX].


The primary article types used in the Cybersecurity Wiki are:
The primary article types used in the Cybersecurity Wiki are:
== article ==
=== article ===
An article from a journal or magazine.
An article from a journal or magazine.
Required fields: author, title, journal, year
Required fields: author, title, journal, year.
Optional fields: volume, number, pages, month, note, key
Optional fields: volume, number, pages, month, note, key.
   @Article{Hollis_DB:2007,
   @Article{Hollis_DB:2007,
     author      = {Duncan B. Hollis},
     author      = {Duncan B. Hollis},
     title        = {Why States Need an International Law For
     title        = {Why States Need an International Law For
                Information Operations},
                  Information Operations},
     journal      = {Lewis \& Clark L. Rev.},
     journal      = {Lewis \& Clark L. Rev.},
     volume      = {11},
     volume      = {11},
Line 37: Line 50:
     ssrn        = {http://ssrn.com/paper=1083889},
     ssrn        = {http://ssrn.com/paper=1083889},
     keywords    = {cyberwar cyberterror information operations IO
     keywords    = {cyberwar cyberterror information operations IO
                information warfare jus ad bellum jus in bello
                  information warfare jus ad bellum jus in bello
                international humanitarian law use of force
                  international humanitarian law use of force
                civilian distinction perfidy complexity
                  civilian distinction perfidy complexity
                regulatory design international law estonia
                  regulatory design international law estonia
                denial of service attack hactivists computer
                  denial of service attack hactivists computer
                network attack},
                  network attack},
     bibdate      = {2010-05-19},
     bibdate      = {2010-05-19},
   }
   }


== book ==
=== book ===
A book with an explicit publisher.
A book with an explicit publisher.
Required fields: author/editor, title, publisher, year
Required fields: author/editor, title, publisher, year.
Optional fields: volume, series, address, edition, month, note, key.
 
=== inbook ===
 
A part of a book, usually untitled. May be a chapter (or section or whatever) and/or a range of pages.
Required fields: author/editor, title, chapter/pages, publisher, year
Optional fields: volume, series, address, edition, month, note, key
Optional fields: volume, series, address, edition, month, note, key


==conference==
  @Inbook{Camp_Wolfram:2004,
    booktitle    = {Economics of Information Security},
    editors      = [L. Jean Camp and Stephen Lewis},
    author      = {L. Jean Camp and Catherine Wolfram},
    title        = {Pricing Security: Vulnerabilities as Externalities},
    chapter      = {2},
    series      = {Advances in Information Security},
    volume      = {12},
    year        = {2004},
    pages        = {17-34},
    publisher    = {Springer US},
    keywords    = {trust security privacy e-commerce},
    ssrn        = {http://papers.ssrn.com/sol3/papers.cfm?abstract\_id=894966},
    url          = {http://books.google.com/books?id=PbzP9tgeDcAC\&lpg=PA17\&ots=8AOrvEojH5\&dq=Economics\%20of\%20Information\%20Security\&lr\&pg=PA17#v=onepage\&q\&f=false},
    isbn        = {978-1-4020-8089-0}, WorldCat | Amazon
    bibdate      = {2010-05-28},
  }
 
=== conference ===
An article in a conference proceedings. (The same as inproceedings.)
An article in a conference proceedings. (The same as inproceedings.)
Required fields: author, title, booktitle, year
Required fields: author, title, booktitle, year.
Optional fields: editor, pages, organization, publisher, address, month, note, key
Optional fields: editor, pages, organization, publisher, address, month, note, key.


@Conference{Schmitt_et_al:2004,
  @Conference{Schmitt_et_al:2004,
  author      = {Michael N. Schmitt and Heather A. Harrison and
    author      = {Michael N. Schmitt and Heather A. Harrison and
                Thomas C. Wingfield},
                  Thomas C. Wingfield},
  title        = {Computers and War},
    title        = {Computers and War},
  titleaddon  = {The Legal Battlespace},
    titleaddon  = {The Legal Battlespace},
  howpublished = {Online paper},
    howpublished = {Online paper},
  publisher    = {Harvard University},
    publisher    = {Harvard University},
  organization = {Program on Humanitarian Policy and Conflict
    organization = {Program on Humanitarian Policy and Conflict
                Research},
                  Research},
  booktitle    = {Informal High-Level Expert Meeting on Current
    booktitle    = {Informal High-Level Expert Meeting on Current
                Challenges to International Humanitarian Law},
                  Challenges to International Humanitarian Law},
  url          = {http://www.ihlresearch.org/ihl/pdfs/
    url          = {http://www.ihlresearch.org/ihl/pdfs/
                 schmittetal.pdf},
                 schmittetal.pdf},
  urldate      = {2010-05-19},
    urldate      = {2010-05-19},
  month        = {6},
    month        = {6},
  year        = {2004},
    year        = {2004},
  keywords    = {},
    keywords    = {},
  bibdate      = {2010-05-19},
    bibdate      = {2010-05-19},
}
  }


==proceedings==
=== proceedings ===


The proceedings of a conference.
The complete proceedings of a conference.  
Required fields: title, year
Required fields: title, year.
Optional fields: editor, publisher, organization, address, month, note, key
Optional fields: editor, publisher, organization, address, month, note, key.
==techreport==
=== techreport ===


A report published by a school or other institution, usually numbered within a series.
A report published by a school or other institution, usually numbered within a series.
Required fields: author, title, institution, year
Required fields: author, title, institution, year.
Optional fields: type, number, address, month, note, key
Optional fields: type, number, address, month, note, key.


==unpublished==
=== unpublished ===


A document having an author and title, but not formally published.
A document having an author and title, but not formally published.
Required fields: author, title, note
Required fields: author, title, note.
Optional fields: month, year, key
Optional fields: month, year, key.


==misc==
=== misc ===


For use when nothing else fits.
For use when nothing else fits.
Required fields: none
Required fields: none.
Optional fields: author, title, howpublished, month, year, note, key
Optional fields: author, title, howpublished, month, year, note, key.


@Misc{DOD_OGC:1999,
  @Misc{DOD_OGC:1999,
  author      = {Department of Defense Office of General Counsel},
    author      = {Department of Defense Office of General Counsel},
  title        = {An Assessment of International Legal Issues in
    title        = {An Assessment of International Legal Issues in
                Information Operations},
                  Information Operations},
  howpublished = {Online paper},
    howpublished = {Online paper},
  publisher    = {U.S. Government},
    publisher    = {U.S. Government},
  url          = {http://www.au.af.mil/au/awc/awcgate/dod-io-legal/
    url          = {http://www.au.af.mil/au/awc/awcgate/dod-io-legal/
                dod-io-legal.pdf},
                  dod-io-legal.pdf},
  urldate      = {2010-05-18},
    urldate      = {2010-05-18},
  year        = {1999},
    year        = {1999},
  note        = {Principal Author: Phillip A. Johnson},
    note        = {Principal Author: Phillip A. Johnson},
  keywords    = {Law Espionage Treaties Government
    keywords    = {Law Espionage Treaties Government
                International-Law Global Communities Agreements
                  International-Law Global Communities Agreements
                United-Nations Legislation
                  United-Nations Legislation
                International-Relations Law-Enforcement},
                  International-Relations Law-Enforcement},
  bibdate      = {2010-05-18},
    bibdate      = {2010-05-18},
}
  }

Latest revision as of 14:39, 6 August 2012

This page is undergoing revision, thank you for your patience.


Naming Convention for Entries

Do not use BibTeX's automatic "*" entry naming.

The naming convention we are using for entries is:

<last name>_F[M]:<year>

Where <last name> is the primary author's last name, F = first initial and M is an optional middle initial. If there are more than one reference in a year, subsequent ones are labeled with the date plus a sequence letter. (e.g, Duncan_M:2009; Duncan_M:2009A, etc.)

If two authors use <last name 1>_<last name 2>:<year> (e.g., Thomas_Martin:2006).

If more than two authors use <last name 1>_et_al:<year> (e.g., Schmitt_et_al:2004).

For institutional authors use initials (e.g., DOD:2009 = Department of Defense 2009 article)

Journal Names

Journal names should not be abbreviated in BibTeX. However, the full citation in individual references should conform to Bluebook standards, including abbreviations.

Links to Articles and References

Where possible include a url = entry pointing to a location where the reference may be found. If a second location is available use the alturl = key. Chose the location most likely to be persistent over time for the url = key. IF an SSRN entry is available use the SSRN = key.

Reference Types (with Examples)

The available types of BibTeX entries and fields are documented at http://en.wikipedia.org/wiki/BibTeX.

The primary article types used in the Cybersecurity Wiki are:

article

An article from a journal or magazine. Required fields: author, title, journal, year. Optional fields: volume, number, pages, month, note, key.

 @Article{Hollis_DB:2007,
   author       = {Duncan B. Hollis},
   title        = {Why States Need an International Law For
                  Information Operations},
   journal      = {Lewis \& Clark L. Rev.},
   volume       = {11},
   year         = {2007},
   pages        = {1023},
   url          = {http://legacy.lclark.edu/org/lclr/objects/
                LCB\_11\_4\_Art7\_Hollis.pdf},
   ssrn         = {http://ssrn.com/paper=1083889},
   keywords     = {cyberwar cyberterror information operations IO
                  information warfare jus ad bellum jus in bello
                  international humanitarian law use of force
                  civilian distinction perfidy complexity
                  regulatory design international law estonia
                  denial of service attack hactivists computer
                  network attack},
   bibdate      = {2010-05-19},
 }

book

A book with an explicit publisher. Required fields: author/editor, title, publisher, year. Optional fields: volume, series, address, edition, month, note, key.

inbook

A part of a book, usually untitled. May be a chapter (or section or whatever) and/or a range of pages. Required fields: author/editor, title, chapter/pages, publisher, year Optional fields: volume, series, address, edition, month, note, key

 @Inbook{Camp_Wolfram:2004,
   booktitle    = {Economics of Information Security},
   editors      = [L. Jean Camp and Stephen Lewis},
   author       = {L. Jean Camp and Catherine Wolfram},
   title        = {Pricing Security: Vulnerabilities as Externalities},
   chapter      = {2},
   series       = {Advances in Information Security},
   volume       = {12},
   year         = {2004},
   pages        = {17-34},
   publisher    = {Springer US},
   keywords     = {trust security privacy e-commerce},
   ssrn         = {http://papers.ssrn.com/sol3/papers.cfm?abstract\_id=894966},
   url          = {http://books.google.com/books?id=PbzP9tgeDcAC\&lpg=PA17\&ots=8AOrvEojH5\&dq=Economics\%20of\%20Information\%20Security\&lr\&pg=PA17#v=onepage\&q\&f=false},
   isbn         = {978-1-4020-8089-0}, WorldCat | Amazon
   bibdate      = {2010-05-28},
 }

conference

An article in a conference proceedings. (The same as inproceedings.) Required fields: author, title, booktitle, year. Optional fields: editor, pages, organization, publisher, address, month, note, key.

 @Conference{Schmitt_et_al:2004,
   author       = {Michael N. Schmitt and Heather A. Harrison and
                  Thomas C. Wingfield},
   title        = {Computers and War},
   titleaddon   = {The Legal Battlespace},
   howpublished = {Online paper},
   publisher    = {Harvard University},
   organization = {Program on Humanitarian Policy and Conflict
                  Research},
   booktitle    = {Informal High-Level Expert Meeting on Current
                  Challenges to International Humanitarian Law},
   url          = {http://www.ihlresearch.org/ihl/pdfs/
                schmittetal.pdf},
   urldate      = {2010-05-19},
   month        = {6},
   year         = {2004},
   keywords     = {},
   bibdate      = {2010-05-19},
 }

proceedings

The complete proceedings of a conference. Required fields: title, year. Optional fields: editor, publisher, organization, address, month, note, key.

techreport

A report published by a school or other institution, usually numbered within a series. Required fields: author, title, institution, year. Optional fields: type, number, address, month, note, key.

unpublished

A document having an author and title, but not formally published. Required fields: author, title, note. Optional fields: month, year, key.

misc

For use when nothing else fits. Required fields: none. Optional fields: author, title, howpublished, month, year, note, key.

 @Misc{DOD_OGC:1999,
   author       = {Department of Defense Office of General Counsel},
   title        = {An Assessment of International Legal Issues in
                  Information Operations},
   howpublished = {Online paper},
   publisher    = {U.S. Government},
   url          = {http://www.au.af.mil/au/awc/awcgate/dod-io-legal/
                  dod-io-legal.pdf},
   urldate      = {2010-05-18},
   year         = {1999},
   note         = {Principal Author: Phillip A. Johnson},
   keywords     = {Law Espionage Treaties Government
                  International-Law Global Communities Agreements
                  United-Nations Legislation
                  International-Relations Law-Enforcement},
   bibdate      = {2010-05-18},
 }