Difference between revisions of "Guidelines for adding Bibliography entries"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
The available types of BibTeX entries and fields are documented at [http://en.wikipedia.org/wiki/BibTeX].
The primary ones used in the Cybersecurity Wiki are:
== article ==
An article from a journal or magazine.
Required fields: author, title, journal, year
Optional fields: volume, number, pages, month, note, key
  author      = {Duncan B. Hollis},
  title        = {Why States Need an International Law For
                Information Operations},
  journal      = {Lewis \& Clark L. Rev.},
  volume      = {11},
  year        = {2007},
  pages        = {1023},
  url          = {http://legacy.lclark.edu/org/lclr/objects/
  ssrn        = {http://ssrn.com/paper=1083889},
  keywords    = {cyberwar cyberterror information operations IO
                information warfare jus ad bellum jus in bello
                international humanitarian law use of force
                civilian distinction perfidy complexity
                regulatory design international law estonia
                denial of service attack hactivists computer
                network attack},
  bibdate      = {2010-05-19},
== book ==
A book with an explicit publisher.
Required fields: author/editor, title, publisher, year
Optional fields: volume, series, address, edition, month, note, key
An article in a conference proceedings. (The same as inproceedings.)
Required fields: author, title, booktitle, year
Optional fields: editor, pages, organization, publisher, address, month, note, key
  author      = {Michael N. Schmitt and Heather A. Harrison and
                Thomas C. Wingfield},
  title        = {Computers and War},
  titleaddon  = {The Legal Battlespace},
  howpublished = {Online paper},
  publisher    = {Harvard University},
  organization = {Program on Humanitarian Policy and Conflict
  booktitle    = {Informal High-Level Expert Meeting on Current
                Challenges to International Humanitarian Law},
  url          = {http://www.ihlresearch.org/ihl/pdfs/
  urldate      = {2010-05-19},
  month        = {6},
  year        = {2004},
  keywords    = {},
  bibdate      = {2010-05-19},
The proceedings of a conference.
Required fields: title, year
Optional fields: editor, publisher, organization, address, month, note, key
A report published by a school or other institution, usually numbered within a series.
Required fields: author, title, institution, year
Optional fields: type, number, address, month, note, key
A document having an author and title, but not formally published.
Required fields: author, title, note
Optional fields: month, year, key
For use when nothing else fits.
Required fields: none
Optional fields: author, title, howpublished, month, year, note, key
   author      = {Department of Defense Office of General Counsel},
   author      = {Department of Defense Office of General Counsel},
   title        = {An Assessment of International Legal Issues in
   title        = {An Assessment of International Legal Issues in
Line 102: Line 15:
                 International-Relations Law-Enforcement},
                 International-Relations Law-Enforcement},
   bibdate      = {2010-05-18},
   bibdate      = {2010-05-18},

Revision as of 09:43, 28 May 2010


 author       = {Department of Defense Office of General Counsel},
 title        = {An Assessment of International Legal Issues in
                Information Operations},
 howpublished = {Online paper},
 publisher    = {U.S. Government},
 url          = {http://www.au.af.mil/au/awc/awcgate/dod-io-legal/
 urldate      = {2010-05-18},
 year         = {1999},
 note         = {Principal Author: Phillip A. Johnson},
 keywords     = {Law Espionage Treaties Government
                International-Law Global Communities Agreements
                United-Nations Legislation
                International-Relations Law-Enforcement},
 bibdate      = {2010-05-18},