Information Technology Reference
In-Depth Information
write “(Howing 1994; pp. 22-31)” rather than just “(Howing 1994)”. If the reference
is to a chapter, give its title, pages, and, if applicable, authors.
Technical reports . In addition to title, authors, year, and report number, you need to
provide the address of the publisher (which is usually the authors' home institution).
If the report is available online, give its URL. Given that technical reports are now
so rare, and are relatively unreliable as a source of scientific knowledge, consider
removing such references from the bibliography and citing directly from the text via
a footnote.
Web pages . If you cite a Web page, attempt to find a durable URL that is unlikely
to change if, for example, a researcher changes institution. In addition to the usual
details, give theURL; they can include unusual characters, somake sure you represent
these correctly. It is a preferred practice to also include the date on which the Web
page was accessed. However, as for technical reports, it is usually better to refer to
such material in a footnote rather than as a formal entry in a bibliography. You should
still provide sufficient details, of course, and a durable URL.
Personal communications . An email from a colleague is not a durable document,
and should never be cited. If you have to mention it, use a footnote.
All references . Take particular care to provide as much information as possible. If the
reference is obscure, but you feel that you must refer to the First Scandinavian Work-
shop on Backward Compatibility, consider explaining how to obtain the proceedings
or a copy of the paper. Any of these kinds of references might have a DOI, or some
other form of permanent URL. If such a URL is available, you should include it.
Punctuation of citations is considered in Chap. 8 , and ethical issues with regard
to citations and references are discussed in Chap. 17 .
Quotation
Quotations are text from another source, usually included in a paper to support an
argument. The copied text, if short, is enclosed in double quotes (which are more
visible than single quotes and cannot be confused with apostrophes). Longer quotes
are set aside in an indented block.
Computer security forensics is “the study of matching an intrusion event to
an IP address, location, and individual” (Brinton 1997).
As described by Kang [16], there are three stages:
First, each distinct word is extracted from the data. During this phase, statistics are
gathered about frequency of occurrence. Second, the set of words is analyzed, to
decide which are to be discarded and what weights to allocate to those that remain.
Third, the data is processed again to determine likely aliases for the remaining words.
The quoted material should be an exact transcription of the original text; some
syntactic changes are permissible, so long as the meaning of the text is unaltered,
 
Search WWH ::




Custom Search