The document provides an overview of APA citation rules, including how to format in-text citations and references for sources with different numbers of authors. It discusses citing single and multiple authors in both narrative and parenthetical citations. Specific formatting is outlined for quotations, sources from the same author, and sources published the same year. Examples are provided to illustrate each rule.
2. What, why and where of APA citation
Rules and formats of in-text citations
APA Rules of Citation:
This lesson includes the following topic areas:
Understanding and Avoiding
Plagiarism
3. Understanding and Avoiding Plagiarism
What is APA format?
The APA (American Psychological Association) format is
an accepted form of source documentation that provides
the reader immediate recognition of the original author
and the timeliness of the source.
APA Rules of Citation:
4. Understanding and Avoiding Plagiarism
Why use the APA format?
There are many reasons the APA format is used:
To acknowledge sources of information accurately
To easily identify the sources of information
To document the credibility of the sources used
To substantiate the ideas presented by the writer
APA Rules of Citation:
5. Understanding and Avoiding Plagiarism
Where is the APA format used?
The APA format is used by many scholarly journals as the
preferred format of source documentation, particularly in
behavioral sciences disciplines.
Within your paper, documentation of sources occurs in
two primary places:
In shortened form in the narrative of the paper (in-
text citations)
In full form at the end of the paper (Reference List)
APA Rules of Citation:
6. Understanding and Avoiding Plagiarism
In-Text Citation:
Identifies sources used within the narrative
Provides two key pieces of information about the source:
Author(s)
Year of publication
Uses parenthetical notation
(Author, Date)
APA Rules of Citation:
Example:
Achievement in online programmes can be enhanced
by delivering instruction in a manner consistent with a
student’s learning style (Zapalska & Brozki, 2006).
7. Understanding and Avoiding Plagiarism
Rules for in-text citations:
Authors are listed in the order their name appears on the
published paper
Name and date must be used in citation
Date can be omitted in subsequent citations within the same
paragraph
Each citation must uniquely identify the source document
No first names are used in the narrative or citations
No initials are used in the narrative or parenthetical citations,
unless needed to identify different authors with the same last
name
APA Rules of Citation:
8. Understanding and Avoiding Plagiarism
In-text citation uses specific formats when located at the end of a
summary of paraphrase:
In parentheses: (Author, Date)
Inside the period
For example:
The 48 percent growth in online retail sales in 2002, and the prediction of
continued growth in 2003, are evidence that consumers are not deterred
by the increase in online fraud, as found in a Shop.org annual study
conducted by Forrester Research (McLaughlin, 2003).
In-text citation formats:
APA Rules of Citation:
9. Understanding and Avoiding Plagiarism
In-text citation uses specific formats when located within the
narrative (as part of the sentence):
Name of author in sentence; date in parentheses
OR
Author and date in sentence
For example:
McLaughlin (2003) reports that even though fraud rates continue to climb,
consumers are not deterred by the increase in online fraud.
OR
In 2003, McLaughlin reported that even though fraud rates continue to
climb, consumers are not deterred by the increase in online fraud.
In-text citation formats:
APA Rules of Citation:
10. Understanding and Avoiding Plagiarism
In-text citation uses specific formats when using a direct quotation:
Follows either of the previous formats;
Includes page number
For example:
McLaughlin (2003) reports that even though fraud rates continue to climb,
“users are not running from the conveniences of online shopping” (p.8).
OR
Even though fraud rates continue to climb, “users are not running from the
conveniences of online shopping” (McLaughlin, 2003, p.8).
In-text citation formats:
APA Rules of Citation:
11. Understanding and Avoiding Plagiarism
When the same author has multiple articles:
Differentiate based on year of publication when applicable
Use a, b, c notation after year, when multiple articles in
same year, making sure there is consistency with the
citations in the Reference List
For example:
Weinberger, a legend in the Unix world, identified phishing among
security and privacy challenges that are most difficult to defend against
(McLaughlin, 2005a). The threat of damage caused by sophisticated
phishing attacks has intensified as a result of the dependency on critical
applications that are placed on the Internet and the increased cleverness
of the attackers, according to Neumann, a principal scientist in SRI’s
Computer Science Lab (McLaughlin,2005b).
In-text citation formats:
APA Rules of Citation:
12. Understanding and Avoiding Plagiarism
When there are two authors for an article:
Always cite both authors
Use “and” in the citation within the narrative
Use “&” in the parenthetical citation
When cited within the narrative:
According to Millett and Holden (2003), networks enable greater
opportunity for privacy risks because of the interconnection between
unrelated systems that have access to centrally located data.
When cited at end of narrative:
Unplanned-for secondary uses of the data may require different privacy
considerations that those used by the original authentication system
(Millett & Holden, 2003).
In-text citation formats:
APA Rules of Citation:
13. Understanding and Avoiding Plagiarism
When there are three to six authors:
Cite all authors in the first citation
Cite first author, followed by et al. in all subsequent citations
When used for the first time in narrative:
Two processes are critical when creating a PKI architecture. First, a trusted
source for the issuance of certificate identities must be located or
established. Secondly, the certificates must be created and issued to the
intended subscribers (Guida, Stahl, Bunt, Secrest, & Moorcones, 2004).
In subsequent citations:
With the use of PKI, the paper-burdened FDA approval process was
significantly reduced for Johnson & Johnson (Guida et al.,2004).
In-text citation formats:
APA Rules of Citation:
14. Understanding and Avoiding Plagiarism
When there are more than six authors:
Always cite first author, followed by et al. in all citations
For example:
Establishing automated trust negotiation has the potential to
broaden participation in electronic transactions far beyond what
is possible with traditional security approaches using digital
credentials (Winslett et al., 2002).
SOURCE: Winslett,M., Yu, T., Seamons,K.E., Hess,A., Jacobson,J., Jarvis,J., et al. (2002). Negotiating
trust on the Web. IEEE Internet Computing, 6(6), 30-37.
In-text citation formats:
APA Rules of Citation:
15. Understanding and Avoiding Plagiarism
When there are multiple authors and the first author is the same,
but others are not:
Use as many names as necessary to make the citation
unique
For example:
Software developers can benefit from the use of domain-specific
languages (DSLs) because these languages are designed to support the
transactions and functions of particular environments and can reduce or
solve software engineering problems that arise during development
(Atkins, Ball, Bruns et al., 1999).
VS.
Quantifying the effects of software tools in large-scale software projects
provides insight on the potential expense and value of acquiring,
deploying and maintaining such tools (Atkins, Ball, Graves et al., 2002).
In-text citation formats:
APA Rules of Citation:
16. Understanding and Avoiding Plagiarism
When there are multiple articles that represent the same ideas:
When the same author has multiple articles list dates in
sequence after the author’s name, starting with the earliest
dates, separated by commas:
(McLaughlin, 2003, 2005a)
When different authors, list alphabetically, separate sources by
semicolons within the same parentheses:
(McLaughlin, 2005a; Millett & Holden, 2003; Ryan, 2004)
In-text citation formats:
APA Rules of Citation:
17. Understanding and Avoiding Plagiarism
Source Materials
Sources on Plagiarism and APA Citation Rules:
Aaron, J.E. (2004). The little, brown compact handbook (5th ed.). New York:
Pearson-Longman.
American Psychological Association. (2001). Publication manual of the American
Psychological Association (5th ed.). Washington, DC: Author.
Clines, R.H., & Cobb, E.R. (2006). Research writing simplified: A documentation
guide (5th ed.). New York: Pearson-Longman.
Winkler, A.C., & McCuen, J.R. (2003). Writing the research paper: A handbook
(6th ed.). Boston, MA: Thomson/Heinle.
18. Understanding and Avoiding Plagiarism
Source Materials
Sources for Examples:
Atkins, D.L., Ball, T., Bruns, G., & Cox, K. (1999). Mawl: A domain-specific language for form-
based services. IEEE Transactions on Software Engineering, 25(3), 334-346.
doi:10.1109/32.798323
Atkins, D.L., Ball, T., Graves, T.L., & Mockus,A. (2002). Using version control data to
evaluate the impact of software tools: A case study of the version editor. IEEE
Transactions on Software Engineering, 28(7), 625-637.
doi:10.1109/TSE.2002.1019478
Guida,R., Stahl, R., Bun, T., Secrest, G., & Moorcones, J. (2004). Deploying and using
Public key technology: Lessons learned in real life. IEEE Security and Privacy, 2(4),
67-71. doi:10.1109/MSP.2004.41
McLaughlin, L. (2003). Online fraud gets sophisticated. IEEE Internet Computing, 7 (5), 6-8.
doi:10.1109/MIC.2003.1232512
McLaughlin, L. (2005a). From AWK to Google: Peter Weinberger talks search. IEEE Security
and Privacy, 3(5), 11-13. doi: 10.1109/MSP.2005.123
McLaughlin, L. (2005b). Winning the game of risk: Neumann’s take on sound design. IEEE
Security and Privacy, 3(6), 9-12. doi: 10.1109/MSP.2005.164
19. Understanding and Avoiding Plagiarism
Source Materials
Sources for Examples:
Millett, L.I., & Holden, S.H. (2003). Authentication and its privacy effects. IEEE Internet
Computing, 7(6), 54-58. doi:10.1109/MIC.2003.1250584
Ryan, J.J.C.H. (2004). Information security tools and practices: What works?. IEEE
Transactions on Computers, 53(8), 1060-1063. doi:10.1109/TC.2004.45
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R. et al. (2002).
Negotiating trust on the Web. IEEE Internet Computing, 6(6), 30-37.
doi:10.1109/MIC.2002.1067734
Zapalska, A., & Brozki, D. (2006). Learning styles and online education, Campus-Wide
Information Systems, 23(5), 325-335. doi: 10.1108/10650740610714080