Вы находитесь на странице: 1из 6

International Journal of Information System Security

ISSN 0718–1876 (Online) www.cserlab.org


VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc

You may set document title from document properties or


please enter title
Given-Name Surname1 and Given-Name Surname2
1
University, Department or School Name, author1@university.edu.cl
2
Institution Name, Place, City author2@organisation.com.cl

Abstract

The abstract is size 8, font Arial and defined as “Abstract Text” in the styles. Please ensure that your abstract
is no longer than 200 words. It should describe the objective of the paper, its methodology, findings and
conclusions. Please note the importance of a concise abstract that will be made available to a number of
technical academic databases. The abstract is really a window to your work. The page setup is A4. The margins
are 2.49 cm top and bottom, and 2.29 cm left and right. The Article Title should have first letters capitalized only,
save for words like “and” and “for”. The primary author should be recorded first (given-name then surname).
Please do not use initials for the first given-name of each author. If there are two authors the word “and” should
separate each author’s name. If there are more than two authors, then commas should separate authors,
except for the final contributor which will be separated by an “and”. Wherever possible the email addresses of
universities or private companies should be included instead of general hotmail or gmail accounts. Where an
author does not work for a university but an institution, the place and city of that institution should be recorded
instead.

Key words: Keyword1, Keyword2, Keyword3, Keyword4, Keyword5 (You may set keywords from
document properties or please enter keywords)

Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc

1 Heading 1 Style
1.1 Heading 2 Style

The largest heading style in the paper (except for the article title) is known as “Heading1” which is numbered, Arial,
Bold, and size 14. Please use the styles that are already defined and do not introduce your own ad-hoc styles.
“Heading 2” is also numbered but additionally indented, Arial, Bold, and size 11. All headings should have the first
letter of each word capitalized. The Introduction should include an introduction to the topic area, with definitions of
terms, as well as the main aim of the paper. Heading 2 styles are separated from immediate text by a single blank
line. All text is fully justified [1]. We would advise that you only use three levels of headings in your work to increase
readability. More levels are allowed but we would advise that you do not go beyond “Heading 5”.

We also suggest that you do not contract words and write them in full. For example write “do not” instead of “don’t”.
Block quotes are allowed but please do not use indenting for emphasis. Simply use quotations marks and minimize
the amount of quoting to a couple of sentences in length, within the main body of the text.

1.2 Heading 2 Style

The paper should also include a thorough literature review which places the work in a particular body of academic
knowledge. You can use a topical approach to your literature review, or a chronological approach. The former is
based on themes, the latter on when the work was written. You should state the previous works relevant to your work,
what methods they utilized, how findings are similar or different. You should also indicate where your paper fits and
what gap it is actually filling in the literature.

When including a figure the caption should go below the figure. When including a table the title goes above the table.
Ensure that your figures are formatted in an aesthetically appealing way, minimize the range of colors to allow for
easy viewing, and ensure your image is not over one megabyte in size [2]. Remember to paste special into the word
document by selecting “Edit>Paste Special>” and select Picture (JPEG). The figure should be cited (figure 1) as
close to the image itself. Please do not write things like: “figure 1 on the following page shows that…”. In addition
make sure your figures fit neatly within the margins and that they are not that large that they detract from the paper’s
formatting.

The figure should have a full line space above and below it. Figures can incorporate your conceptual framework,
methodological approach, or be screenshots of an application you have built, among other things. Please ensure that
all text is in English. For figures including only diagrams and text, please use enhanced metafile (EMF) instead of
JPEG. If the figure or table has been taken from a previous publication, the author must obtain permission from the
publisher to include it in the paper, and also the author must add below the figure or table the following statement:
© “Year(s)” “Publisher Name” printed with permission

It is very important that if you need to make your image smaller that you reduce the size of the figure by using the
diagonals (i.e. the corners of the image) of the box, rather than the sides. This will ensure that figures remain to scale.

Comms Principal Driver Sensor


Module Module Module

Text inside
images , diagrams
Comms and tables must Sensor
Module have a font size 7 Module
or bigger

Sensor
Module

Task Task
Module Module

Figure 1: Use the Caption Style to Name the Figure and to Center the Figure

Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc

Table 1: Sample table using the format and style used by these guidelines

Font Size Bold Italics Special


Article title Arial 16 Yes No Centered
Author name Arial 12 Yes No Centered
Affiliation Arial 9 No No Centered
Abstract Arial 8 - - Justified
Keyword title Arial 9 Yes No Justified
Keywords Arial 9 No No Justified
Heading 1 Style Arial 14 Yes No Justified; Numbered
Heading 2 Style Arial 11 Yes No Justified; Numbered
Heading 3 Style Arial 11 Yes No Justified; Numbered
Paragraph text Arial 9 - - Justified
Heading Acknowledgments Style Arial 14 Yes No Justified
Heading References Style Arial 14 - No Justified
References Arial 9 No No Justified; 0,63 cm left margin
Table and image title Arial 9 - - Centered
Inner image, diagram or table text Arial >=7 - - -

2 Materials and Methods


To number lists of items use the “Enumerated Text” style. At the end of each line do not include a full stop unless
you have text that incorporates several separate sentences on each line item.

1. This is list item number 1

2. This is list item number 2 (you may use parentheses)

3. This is list item number 3

Additionally you can use a bullet list for non-enumerated items. For instance:

· This is a list item

· This is another list item

For a second level of items please use a dash list. For example:

- This is a sub-list item

- This another sub-list item

2.1 Heading 2 Style

All papers must include a methodological approach, state their findings clearly in a dedicated section, and provide a
well-structured conclusions section highlighting the importance of the findings for researchers and practitioners.

For the purposes of spelling, please turn on your North American dictionaries. Do not add any footers or headers. Do
not paginate the document. Use available style headings only. Do not use footnotes or endnotes. If you need to use
dashes in your work please place the dash immediately after the letter of the last word and then allow for a space
before finishing your sentence. For example, “the methods chosen were two-fold- survey and interviews”.

2.1.1 Heading 3 Style


You must fax your fully-completed, signed copyright release form when you submit the final version of your paper.
We must have this form before your paper can be published in JTAER (Site 1). The copyright form is available as a
PDF file.

2.1.2 References and Citation Style


Our references style is based on the IEEE Transaction and Journal references style, but with slight differences that
we describe here. Please note the “References” heading is not numbered.

Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc

Authors names are recorded and separated by commas except for the final author who is separated by an “and”.
Unlike the IEEE style, do no italicize any details; do not enclose details between quotes. Take note of spacing,
commas, year date and how page numbers are recorded. There are subtle differences for each.

In the text, indicate references by Arabic numerals in square brackets with a space before the bracket.
For example, “….end of line for a paragraph in my article [5].”.

It is not necessary to mention the authors(s) of the reference unless it is relevant to your text.

Do not mention the date of the reference in the text.

It is not necessary to say: in reference [15] …. To say: In [15] … is sufficient.

To cite more than one source at a time see examples below:

Citing several non-consecutives references (citing references 1, 5 and 21):


[1], [5], [21]

Citing several consecutives references (citing references 1,2,3,4, and 5):


[1] - [5]

Citing a reference [5] to a single page (for example, to page 231):


[5] p. 231

Citing a reference [5] to a range of pages (for example, from page 231 to page 240):
[5] pp. 231 - 240

Please ensure that every reference cited in the text is also “present” in the reference list (and vice versa). Any
references cited in the abstract must be given in full. Reports, private communication, and manuals should not be
referenced/cited unless absolutely necessary.

Please also avoid using abbreviations in your references.

References should be listed (in the references section) alphabetically by surname.

Examples of how to reference:

· Books [13], [19],

· Articles/chapters in a book [5], [22],

· Journal papers (periodicals) [3] - [4], [14]

· Papers in proceedings [2], [12],

· Papers presented at conferences (unpublished) [9], [16],

· Online sources [6], [18] (in the example, (2001,March) is the date of publication),

· Thesis or dissertation (“Ph.D. dissertation,” but “M.S. Thesis”) [21], [23],

· Reports (technical reports, internal reports, provide number and month if available) [7], [8],

· Manuals [1], [15], [17],

· Private communications [10] and

· Patents [11], [20],

can be found in the references section.

There is a difference between citing online references and citing websites. Citing an online reference is referring to a
specific document which has author(s) and publication date. These online references are listed in the references
section (Online sources). Citing a website is referring to the whole website ( for example, if the author refers to a
4

Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc

case study website; “In this study we are analyzing the websites of the University of Wollongong (Site 3) and the
University of Talca (Site 2)” ). These websites are listed in the websites list section. Please see an example of a
websites list after the acknowledgments section.

Acknowledgments
I would like to gratefully acknowledge the support of the Editorial Technical Team for setting these guidelines. In
particular my thanks go to Dr. Katina Michael from the University of Wollongong and previous collaborators such as
Dr. Per Bro, Mr. Cesar Astudillo, and Mr. Jorge Perez from the Universidad de Talca, who helped to set the Word
and LaTeX Author Guidelines.

Example of a Websites List


Site 1: Journal of Theoretical and Applied Electronic Commerce Research (JTAER)
http://www.jtaer.com

Site 2: Universidad de Talca


http://www.utalca.cl

Site 3 University of Wollongong (UOW)


http://www.uow.edu.au/

References
[1] Bell Telephone Laboratories Technical Staff, Transmission System for Communications, Bell Telephone
Laboratories, 1995.
[2] S. P. Bingulac, On the compatibility of adaptive controllers, in Proceedings 4th Annual Allerton Conference on
Circuits and Systems Theory, New York, 1994, pp. 8-16.
[3] R. C. Carter, Search time with a color display: Analysis of distribution functions, Human Factors, vol. 24, no. 3,
pp. 302-304,1982.
[4] S. Chen, B. Mulgrew, and P. M. Grant, A clustering technique for digital communications channel equalization
using radial basis function networks, IEEE Trans. Neural Networks, vol. 4, pp. 570–578, July 1993.
[5] J. W. DuBois, S. Schuetze-Coburn, S. Cumming, and D. Paolino, Outline of discourse transcription, in Talking
Data: Transcription and Coding in Discourse Research (J. A. Edwards and M. D. Lampert, Eds.). Hillsdale, NJ:
Lawrence Erlbaum Associates, 1993, pp. 45-89.
[6] W. A. Effross. (2001, March) Withdrawal of the reference: Rights, rules, and remedies for unwelcomed web-
linking. University of South Carolina School of Law Website. [Online]. Available:
http://www.law.sc.edu/sclr/EFFROSS.htm.
[7] K. E. Elliott and C. M. Greene, A local adaptive protocol, Argonne National Laboratory, Argonne, France,
Technical Report 916-1010-BB, 1997.
[8] R. E. Haskell and C. T. Case, Transient signal propagation in lossless isotropic plasmas, USAF Cambridge
Research Laboratory, Cambridge, MA Rep. ARCRL-66-234 (II), 1994, vol. 2.
[9] G. W. Juette and L. E. Zeffanella, Radio noise currents in short sections on bundle conductors, presented at the
IEEE Summer power Meeting, Dallas, TX, June 22-27, 1990, Paper 90 SM 690-0 PWRS.
[10] C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
[11] K. Kimura and A. Lipeles, Fuzzy Controller Component, U. S. Patent 14 860 040, December 14, 1996.
[12] P. Leone, D. L. Gillihan, and T. L. Rauch, Web-based prototyping for user sessions: Medium-fidelity prototyping,
in Proceedings of 44th International Technical Communications Conference. Toronto, Canada. Society of
Technology for Communications, 1997, pp. 231-234.
[13] M. S. MacNealy, Strategies for Empirical Research in Writing. Boston: Allyn & Bacon, 1999.
[14] E. H. Miller, A note on reflector arrays, IEEE Transactions on Antennas Propagation, to be published.
[15] Motorola Semiconductor Data Manual, Motorola Semiconductor Products Inc., Phoenix, AZ, 1989.
[16] K. Riley, Language theory: Application versus practice, presented at the Conference of the Modern Language
Association, Boston, MA, December 27-30, 1990.
[17] Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, 1985, pp. 44–60.
[18] R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE
Transactions on Plasma Science. [Online]. vol. 21, no. 3, pp. 876-880. Available:
http://www.halcyon.com/pub/journals/21ps03-vidmar.
[19] J. H. Watt and S. A. van den Berg, Research Methods for Communication Science. Boston, MA: Allyn and
Bacon, 1995.
[20] J. P. Wilkinson, Nonlinear resonant circuit devices, U.S. Patent 3 624 12, July 16, 1990.
[21] J. Williams, Narrow-band analyzer, Ph.D. dissertation, Department of Electrical Engineering, Harvard University,
Cambridge, MA, 1993.
[22] G. O. Young, Synthetic structure of industrial plastics, in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York:
McGraw-Hill, 1964, pp. 15-64.
5

Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc

[23] H. Zhang, Delay-insensitive networks, M.S. thesis, University of Waterloo, Waterloo, ON, Canada, 1997.

Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry

Вам также может понравиться