Академический Документы
Профессиональный Документы
Культура Документы
Abstract
The abstract is size 8, font Arial and defined as “Abstract Text” in the styles. Please ensure that your abstract
is no longer than 200 words. It should describe the objective of the paper, its methodology, findings and
conclusions. Please note the importance of a concise abstract that will be made available to a number of
technical academic databases. The abstract is really a window to your work. The page setup is A4. The margins
are 2.49 cm top and bottom, and 2.29 cm left and right. The Article Title should have first letters capitalized only,
save for words like “and” and “for”. The primary author should be recorded first (given-name then surname).
Please do not use initials for the first given-name of each author. If there are two authors the word “and” should
separate each author’s name. If there are more than two authors, then commas should separate authors,
except for the final contributor which will be separated by an “and”. Wherever possible the email addresses of
universities or private companies should be included instead of general hotmail or gmail accounts. Where an
author does not work for a university but an institution, the place and city of that institution should be recorded
instead.
Key words: Keyword1, Keyword2, Keyword3, Keyword4, Keyword5 (You may set keywords from
document properties or please enter keywords)
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc
1 Heading 1 Style
1.1 Heading 2 Style
The largest heading style in the paper (except for the article title) is known as “Heading1” which is numbered, Arial,
Bold, and size 14. Please use the styles that are already defined and do not introduce your own ad-hoc styles.
“Heading 2” is also numbered but additionally indented, Arial, Bold, and size 11. All headings should have the first
letter of each word capitalized. The Introduction should include an introduction to the topic area, with definitions of
terms, as well as the main aim of the paper. Heading 2 styles are separated from immediate text by a single blank
line. All text is fully justified [1]. We would advise that you only use three levels of headings in your work to increase
readability. More levels are allowed but we would advise that you do not go beyond “Heading 5”.
We also suggest that you do not contract words and write them in full. For example write “do not” instead of “don’t”.
Block quotes are allowed but please do not use indenting for emphasis. Simply use quotations marks and minimize
the amount of quoting to a couple of sentences in length, within the main body of the text.
The paper should also include a thorough literature review which places the work in a particular body of academic
knowledge. You can use a topical approach to your literature review, or a chronological approach. The former is
based on themes, the latter on when the work was written. You should state the previous works relevant to your work,
what methods they utilized, how findings are similar or different. You should also indicate where your paper fits and
what gap it is actually filling in the literature.
When including a figure the caption should go below the figure. When including a table the title goes above the table.
Ensure that your figures are formatted in an aesthetically appealing way, minimize the range of colors to allow for
easy viewing, and ensure your image is not over one megabyte in size [2]. Remember to paste special into the word
document by selecting “Edit>Paste Special>” and select Picture (JPEG). The figure should be cited (figure 1) as
close to the image itself. Please do not write things like: “figure 1 on the following page shows that…”. In addition
make sure your figures fit neatly within the margins and that they are not that large that they detract from the paper’s
formatting.
The figure should have a full line space above and below it. Figures can incorporate your conceptual framework,
methodological approach, or be screenshots of an application you have built, among other things. Please ensure that
all text is in English. For figures including only diagrams and text, please use enhanced metafile (EMF) instead of
JPEG. If the figure or table has been taken from a previous publication, the author must obtain permission from the
publisher to include it in the paper, and also the author must add below the figure or table the following statement:
© “Year(s)” “Publisher Name” printed with permission
It is very important that if you need to make your image smaller that you reduce the size of the figure by using the
diagonals (i.e. the corners of the image) of the box, rather than the sides. This will ensure that figures remain to scale.
Text inside
images , diagrams
Comms and tables must Sensor
Module have a font size 7 Module
or bigger
Sensor
Module
Task Task
Module Module
Figure 1: Use the Caption Style to Name the Figure and to Center the Figure
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc
Table 1: Sample table using the format and style used by these guidelines
Additionally you can use a bullet list for non-enumerated items. For instance:
For a second level of items please use a dash list. For example:
All papers must include a methodological approach, state their findings clearly in a dedicated section, and provide a
well-structured conclusions section highlighting the importance of the findings for researchers and practitioners.
For the purposes of spelling, please turn on your North American dictionaries. Do not add any footers or headers. Do
not paginate the document. Use available style headings only. Do not use footnotes or endnotes. If you need to use
dashes in your work please place the dash immediately after the letter of the last word and then allow for a space
before finishing your sentence. For example, “the methods chosen were two-fold- survey and interviews”.
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc
Authors names are recorded and separated by commas except for the final author who is separated by an “and”.
Unlike the IEEE style, do no italicize any details; do not enclose details between quotes. Take note of spacing,
commas, year date and how page numbers are recorded. There are subtle differences for each.
In the text, indicate references by Arabic numerals in square brackets with a space before the bracket.
For example, “….end of line for a paragraph in my article [5].”.
It is not necessary to mention the authors(s) of the reference unless it is relevant to your text.
Citing a reference [5] to a range of pages (for example, from page 231 to page 240):
[5] pp. 231 - 240
Please ensure that every reference cited in the text is also “present” in the reference list (and vice versa). Any
references cited in the abstract must be given in full. Reports, private communication, and manuals should not be
referenced/cited unless absolutely necessary.
· Online sources [6], [18] (in the example, (2001,March) is the date of publication),
· Reports (technical reports, internal reports, provide number and month if available) [7], [8],
There is a difference between citing online references and citing websites. Citing an online reference is referring to a
specific document which has author(s) and publication date. These online references are listed in the references
section (Online sources). Citing a website is referring to the whole website ( for example, if the author refers to a
4
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc
case study website; “In this study we are analyzing the websites of the University of Wollongong (Site 3) and the
University of Talca (Site 2)” ). These websites are listed in the websites list section. Please see an example of a
websites list after the acknowledgments section.
Acknowledgments
I would like to gratefully acknowledge the support of the Editorial Technical Team for setting these guidelines. In
particular my thanks go to Dr. Katina Michael from the University of Wollongong and previous collaborators such as
Dr. Per Bro, Mr. Cesar Astudillo, and Mr. Jorge Perez from the Universidad de Talca, who helped to set the Word
and LaTeX Author Guidelines.
References
[1] Bell Telephone Laboratories Technical Staff, Transmission System for Communications, Bell Telephone
Laboratories, 1995.
[2] S. P. Bingulac, On the compatibility of adaptive controllers, in Proceedings 4th Annual Allerton Conference on
Circuits and Systems Theory, New York, 1994, pp. 8-16.
[3] R. C. Carter, Search time with a color display: Analysis of distribution functions, Human Factors, vol. 24, no. 3,
pp. 302-304,1982.
[4] S. Chen, B. Mulgrew, and P. M. Grant, A clustering technique for digital communications channel equalization
using radial basis function networks, IEEE Trans. Neural Networks, vol. 4, pp. 570–578, July 1993.
[5] J. W. DuBois, S. Schuetze-Coburn, S. Cumming, and D. Paolino, Outline of discourse transcription, in Talking
Data: Transcription and Coding in Discourse Research (J. A. Edwards and M. D. Lampert, Eds.). Hillsdale, NJ:
Lawrence Erlbaum Associates, 1993, pp. 45-89.
[6] W. A. Effross. (2001, March) Withdrawal of the reference: Rights, rules, and remedies for unwelcomed web-
linking. University of South Carolina School of Law Website. [Online]. Available:
http://www.law.sc.edu/sclr/EFFROSS.htm.
[7] K. E. Elliott and C. M. Greene, A local adaptive protocol, Argonne National Laboratory, Argonne, France,
Technical Report 916-1010-BB, 1997.
[8] R. E. Haskell and C. T. Case, Transient signal propagation in lossless isotropic plasmas, USAF Cambridge
Research Laboratory, Cambridge, MA Rep. ARCRL-66-234 (II), 1994, vol. 2.
[9] G. W. Juette and L. E. Zeffanella, Radio noise currents in short sections on bundle conductors, presented at the
IEEE Summer power Meeting, Dallas, TX, June 22-27, 1990, Paper 90 SM 690-0 PWRS.
[10] C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
[11] K. Kimura and A. Lipeles, Fuzzy Controller Component, U. S. Patent 14 860 040, December 14, 1996.
[12] P. Leone, D. L. Gillihan, and T. L. Rauch, Web-based prototyping for user sessions: Medium-fidelity prototyping,
in Proceedings of 44th International Technical Communications Conference. Toronto, Canada. Society of
Technology for Communications, 1997, pp. 231-234.
[13] M. S. MacNealy, Strategies for Empirical Research in Writing. Boston: Allyn & Bacon, 1999.
[14] E. H. Miller, A note on reflector arrays, IEEE Transactions on Antennas Propagation, to be published.
[15] Motorola Semiconductor Data Manual, Motorola Semiconductor Products Inc., Phoenix, AZ, 1989.
[16] K. Riley, Language theory: Application versus practice, presented at the Conference of the Modern Language
Association, Boston, MA, December 27-30, 1990.
[17] Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, 1985, pp. 44–60.
[18] R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE
Transactions on Plasma Science. [Online]. vol. 21, no. 3, pp. 876-880. Available:
http://www.halcyon.com/pub/journals/21ps03-vidmar.
[19] J. H. Watt and S. A. van den Berg, Research Methods for Communication Science. Boston, MA: Allyn and
Bacon, 1995.
[20] J. P. Wilkinson, Nonlinear resonant circuit devices, U.S. Patent 3 624 12, July 16, 1990.
[21] J. Williams, Narrow-band analyzer, Ph.D. dissertation, Department of Electrical Engineering, Harvard University,
Cambridge, MA, 1993.
[22] G. O. Young, Synthetic structure of industrial plastics, in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York:
McGraw-Hill, 1964, pp. 15-64.
5
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry
International Journal of Information System Security
ISSN 0718–1876 (Online) www.cserlab.org
VOL 5 / ISSUE 1 / APRIL 2010 / 1-15
© 2010 CserLab Inc
[23] H. Zhang, Delay-insensitive networks, M.S. thesis, University of Waterloo, Waterloo, ON, Canada, 1997.
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Vincent Wolff-Marting & André Köhler
Case Study from the Insurance Industry