2. Rules and formats of reference list citations
APA Rules of Citation:
This lesson includes the following topic areas:
Understanding and Avoiding
Plagiarism
3. Understanding and Avoiding Plagiarism
Reference List citations:
Identifies sources used within the narrative
Provides accurate and complete information about the source:
Author(s)
Year of publication
Title
Publishing data
Digital Object Identifier (DOI) [if no DOI is available, and
retrieved online include URL using: Retrieved from: URL]
Uses different formats based on type of publication
APA Rules of Citation:
4. Understanding and Avoiding Plagiarism
Rules for Reference List citations:
Sources are listed in alphabetical order by the surname of
the first author
Sources by the same author are listed by year of publication,
with the earliest listed first.
Sources by the same author with the same publication year
are listed alphabetically by the title, and designated with an
alphabetical extension to the date
Sources by authors with the same surname are listed
alphabetically by the first initial
No first names are used in the citations – initials only
Sources are formatted using hanging indents (.5 inches)
APA Rules of Citation:
5. Understanding and Avoiding Plagiarism
Reference List citations: PERIODICALS
A Reference List citation for periodicals generally includes the
following elements:
Author (followed by a period)
Date of publication (in parentheses, followed by a period)
Title of article (capitalize first word of title, first word after
punctuation, and proper names or nouns, followed by a period)
Periodical name (in italics, followed by a comma)
Volume number (in italics)
Issue number (in parentheses, not italic, followed by a comma)
Page numbers (hyphenated, followed by a period)
DOI (if available, include all alphanumeric information)
McLaughlin, L. (2003). Online fraud gets sophisticated. IEEE Internet
Computing, 7 (5), 6-8. doi:10.1109/MIC.2003.1232512
APA Rules of Citation:
6. Understanding and Avoiding Plagiarism
Reference List citations: BOOKS
A Reference List citation for books generally includes the following
elements:
Author (followed by a period)
Date of publication (in parentheses, followed by a period)
Title (in italics, capitalize first word of title, first word after
punctuation, and proper names or nouns, followed by a period)
Edition (in parentheses, not italic, before period for title)
Publication location (followed by a colon)
Publisher name (followed by a period)
DOI (if available)
Winkler, A.C., & McCuen, J.R. (2003). Writing the research paper: A
handbook (6th ed.). Boston, MA: Thomson/Heinle.
APA Rules of Citation:
7. Understanding and Avoiding Plagiarism
Reference List citations: Journal Articles
Articles by one author:
Articles by one author, multiple publications in same year:
McLaughlin, L. (2003). Online fraud gets sophisticated. IEEE Internet
Computing, 7(5), 6-8. doi:10.1109/MIC.2003.1232512
McLaughlin, L. (2005a). From AWK to Google: Peter Weinberger talks search.
IEEE Security and Privacy, 3(5), 11-13. doi: 10.1109/MSP.2005.123
McLaughlin, L. (2005b). Winning the game of risk: Neumann’s take on sound
design. IEEE Security and Privacy, 3(6), 9-12. doi: 10.1109/MSP.2005.164
APA Rules of Citation:
8. Understanding and Avoiding Plagiarism
Reference List citations: Journal Articles
Articles by different authors with same surname listed
alphabetically by first initials:
Articles by two authors:
Ryan, D.J. (2003). Two views on security software liability: Let the legal system
decide. IEEE Security and Privacy, 1(1), 70-72.
doi:10.1109/MSECP.2003.1176999
Ryan, J.J.C.H. (2004). Information security tools and practices: What works?.
IEEE Transactions on Computers, 53(8), 1060-1063.
doi:10.1109/TC.2004.45
Millett, L.I., & Holden, S.H. (2003). Authentication and its privacy effects. IEEE
Internet Computing, 7(6), 54-58. doi:10.1109/MIC.2003.1250584
APA Rules of Citation:
9. Understanding and Avoiding Plagiarism
Articles by three to six authors list all names:
Articles by more than six authors list first six names followed
by et al.:
Guida, R., Stahl, R., Bunt, T., Secrest, G., & Moorcones, J. (2004). Deploying
and using public key technology: Lessons learned in real life. IEEE
Security and Privacy, 2(4), 67-71. doi:10.1109/MSP.2004.41
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, J., et al.
(2002). Negotiating trust on the Web. IEEE Internet Computing, 6(6), 30-
37. doi:10.1109/MIC.2002.1067734
APA Rules of Citation:
Reference List citations: Journal Articles
10. Understanding and Avoiding Plagiarism
Source Materials
Sources on Plagiarism and APA Citation Rules:
Aaron, J.E. (2004). The little, brown compact handbook (5th ed.). New York:
Pearson-Longman.
American Psychological Association. (2001). Publication manual of the American
Psychological Association (5th ed.). Washington, DC: Author.
Clines, R.H., & Cobb, E.R. (2006). Research writing simplified: A documentation
guide (5th ed.). New York: Pearson-Longman.
Winkler, A.C., & McCuen, J.R. (2003). Writing the research paper: A handbook
(6th ed.). Boston, MA: Thomson/Heinle.
11. Understanding and Avoiding Plagiarism
Source Materials
Sources for Examples:
Guida,R., Stahl, R., Bun, T., Secrest, G., & Moorcones, J. (2004). Deploying and using Public key
technology: Lessons learned in real life. IEEE Security and Privacy, 2(4), 67-71.
doi:10.1109/MSP.2004.41
McLaughlin, L. (2003). Online fraud gets sophisticated. IEEE Internet Computing, 7 (5), 6-8.
doi:10.1109/MIC.2003.1232512
McLaughlin, L. (2005a). From AWK to Google: Peter Weinberger talks search. IEEE Security and Privacy,
3(5), 11-13. doi: 10.1109/MSP.2005.123
McLaughlin, L. (2005b). Winning the game of risk: Neumann’s take on sound design. IEEE Security and
Privacy, 3(6), 9-12. doi: 10.1109/MSP.2005.164
Millett, L.I., & Holden, S.H. (2003). Authentication and its privacy effects. IEEE Internet Computing, 7(6), 54-
58. doi:10.1109/MIC.2003.1250584
Ryan, D.J. (2003). Two views on security software liability: Let the legal system decide. IEEE Security and
Privacy, 1(1), 70-72. doi:10.1109/MSECP.2003.1176999
Ryan, J.J.C.H. (2004). Information security tools and practices: What works?. IEEE Transactions on
Computers, 53(8), 1060-1063. doi:10.1109/TC.2004.45
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R. et al. (2002). Negotiating trust on the
Web. IEEE Internet Computing, 6(6), 30-37. doi:10.1109/MIC.2002.1067734