How to format your references using the Security Informatics citation style

This is a short guide how to format citations and the bibliography in a manuscript for Security Informatics. For a complete guide how to prepare your manuscript refer to the journal's instructions to authors.

Using reference management software

Typically you don't format your citations and bibliography by hand. The easiest way is to use a reference manager:

PaperpileThe citation style is built in and you can choose it in Settings > Citation Style or Paperpile > Citation Style in Google Docs.
EndNoteFind the style here: output styles overview
Mendeley, Zotero, Papers, and othersThe style is either built in or you can download a CSL file that is supported by most references management programs.
BibTeXBibTeX syles are usually part of a LaTeX template. Check the instructions to authors if the publisher offers a LaTeX template for this journal.

Journal articles

Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.

Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.

A journal article with 1 author
1.
Köhling R (2002) Neuroscience. GABA becomes exciting. Science 298:1350–1351
A journal article with 2 authors
1.
Weatherhead EC, Andersen SB (2006) The search for signs of recovery of the ozone layer. Nature 441:39–45
A journal article with 3 authors
1.
Chou SY, Keimel C, Gu J (2002) Ultrafast and direct imprint of nanostructures in silicon. Nature 417:835–837
A journal article with 5 or more authors
1.
Watson TF, Philips SGJ, Kawakami E, et al (2018) A programmable two-qubit quantum processor in silicon. Nature 555:633–637

Books and book chapters

Here are examples of references for authored and edited books as well as book chapters.

An authored book
1.
Best P (2005) Implementing Value at Risk. John Wiley & Sons, Ltd, Chichester, UK
An edited book
1.
Costabile MF, Dittrich Y, Fischer G, Piccinno A (2011) End-User Development: Third International Symposium, IS-EUD 2011, Torre Canne (BR), Italy, June 7-10, 2011. Proceedings. Springer, Berlin, Heidelberg
A chapter in an edited book
1.
Benešová V, Bojar O (2006) Czech Verbs of Communication and the Extraction of Their Frames. In: Sojka P, Kopeček I, Pala K (eds) Text, Speech and Dialogue: 9th International Conference, TSD 2006, Brno, Czech Republic, September 11-15, 2006. Proceedings. Springer, Berlin, Heidelberg, pp 29–36

Web sites

Sometimes references to web sites should appear directly in the text rather than in the bibliography. Refer to the Instructions to authors for Security Informatics.

Blog post
1.
Carpineti A (2016) Neutrino Beam Experiment Could Explain A Fundamental Problem With The Universe. In: IFLScience. https://www.iflscience.com/physics/neutrino-beam-experiment-could-explain-a-fundamental-problem-with-the-universe/. Accessed 30 Oct 2018

Reports

This example shows the general structure used for government reports, technical reports, and scientific reports. If you can't locate the report number then it might be better to cite the report as a book. For reports it is usually not individual people that are credited as authors, but a governmental department or agency like "U. S. Food and Drug Administration" or "National Cancer Institute".

Government report
1.
Government Accountability Office (1987) U.S. Science and Engineering Base: A Synthesis of Concerns About Budget and Policy Development. U.S. Government Printing Office, Washington, DC

Theses and dissertations

Theses including Ph.D. dissertations, Master's theses or Bachelor theses follow the basic format outlined below.

Doctoral dissertation
1.
Kong C (2001) Formal Methods Applied to the Specification of an Active Network Node. Doctoral dissertation, University of Cincinnati

News paper articles

Unlike scholarly journals, news papers do not usually have a volume and issue number. Instead, the full date and page number is required for a correct reference.

New York Times article
1.
Brantley B (2017) Doomed Youth, Potent Despair. New York Times C1

In-text citations

References should be cited in the text by sequential numbers in square brackets:

This sentence cites one reference [1].
This sentence cites two references [1, 2].
This sentence cites four references [1–4].

About the journal

Full journal titleSecurity Informatics
AbbreviationSecur. Inform.
ISSN (online)2190-8532
Scope

Other styles