How to format your references using the Security Informatics citation style

This is a short guide how to format citations and the bibliography in a manuscript for Security Informatics. For a complete guide how to prepare your manuscript refer to the journal's instructions to authors.

Using reference management software

Typically you don't format your citations and bibliography by hand. The easiest way is to use a reference manager:

PaperpileThe citation style is built in and you can choose it in Settings > Citation Style or Paperpile > Citation Style in Google Docs.
EndNoteFind the style here: output styles overview
Mendeley, Zotero, Papers, and othersThe style is either built in or you can download a CSL file that is supported by most references management programs.
BibTeXBibTeX syles are usually part of a LaTeX template. Check the instructions to authors if the publisher offers a LaTeX template for this journal.

Journal articles

Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.

Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.

A journal article with 1 author
1.
Git A (2012) Research tools: A recipe for disaster. Nature 484:439–440
A journal article with 2 authors
1.
Price WN 2nd, Rai AK (2015) Drug Development. Are trade secrets delaying biosimilars? Science 348:188–189
A journal article with 3 authors
1.
Cronberg N, Natcheva R, Hedlund K (2006) Microarthropods mediate sperm transfer in mosses. Science 313:1255
A journal article with 5 or more authors
1.
Mook HA, Dai P, Dogan F, Hunt RD (2000) One-dimensional nature of the magnetic fluctuations in YBa2Cu3O6.6. Nature 404:729–731

Books and book chapters

Here are examples of references for authored and edited books as well as book chapters.

An authored book
1.
Ruppel W (2015) Wiley GAAP for Governments 2015. John Wiley & Sons, Ltd, Chichester, UK
An edited book
1.
Rizvi NB (2014) Minerals and Lipids Profiles in Cardiovascular Disorders in South Asia: Cu, Mg, Se, Zn and Lipid Serum Profiles for the Example of Patients in Pakistan. Springer, Berlin, Heidelberg
A chapter in an edited book
1.
Dabbagh A (2014) Cardiovascular Monitoring. In: Dabbagh A, Esmailian F, Aranki SF (eds) Postoperative Critical Care for Cardiac Surgical Patients. Springer, Berlin, Heidelberg, pp 77–127

Web sites

Sometimes references to web sites should appear directly in the text rather than in the bibliography. Refer to the Instructions to authors for Security Informatics.

Blog post
1.
Andrew E (2015) How To Make Sense Of ‘Alarming’ Sea Level Forecasts. In: IFLScience. https://www.iflscience.com/environment/how-make-sense-alarming-sea-level-forecasts/. Accessed 30 Oct 2018

Reports

This example shows the general structure used for government reports, technical reports, and scientific reports. If you can't locate the report number then it might be better to cite the report as a book. For reports it is usually not individual people that are credited as authors, but a governmental department or agency like "U. S. Food and Drug Administration" or "National Cancer Institute".

Government report
1.
Government Accountability Office (1988) Federal Aviation Administration’s Advanced Automation System Investment. U.S. Government Printing Office, Washington, DC

Theses and dissertations

Theses including Ph.D. dissertations, Master's theses or Bachelor theses follow the basic format outlined below.

Doctoral dissertation
1.
Murillo K (2010) An analysis of California community college budget policy key components in multicollege districts. Doctoral dissertation, Pepperdine University

News paper articles

Unlike scholarly journals, news papers do not usually have a volume and issue number. Instead, the full date and page number is required for a correct reference.

New York Times article
1.
Vecsey G (2013) Where Are the Yankees I Loved to Hate? New York Times B13

In-text citations

References should be cited in the text by sequential numbers in square brackets:

This sentence cites one reference [1].
This sentence cites two references [1, 2].
This sentence cites four references [1–4].

About the journal

Full journal titleSecurity Informatics
AbbreviationSecur. Inform.
ISSN (online)2190-8532
Scope

Other styles