You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: publications/authoring-guidelines.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
# Authoring Guidelines and Standards
2
2
3
3
The purpose of these guidelines is to ensure the production of high-quality, consistent, and impactful publications. Most pieces are authored as collaborative knowledge production efforts within working groups, under the guidance of a chair or technical leader.
4
-
The topics tend to be sharp under the purview of a working group, for instance, “Software Supply Chain Best Practices,” “Secure Software Factory,” or “Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security,” but sometimes cover broader themes like cloud native security white papers, the lexicon, and use cases and personas.
4
+
The topics tend to be specifc under the purview of a working group, for instance, “Software Supply Chain Best Practices,” “Secure Software Factory,” or “Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security,” but sometimes cover broader themes like cloud native security white papers, the lexicon, and use cases and personas.
5
5
6
6
We strive for quality over quantity, emphasizing the importance of not duplicating existing materials unless we have something new to contribute or a cloud native perspective to offer.
7
7
While some of our publications serve as "tour guides" rather than comprehensive handbooks, there is a recognized need for more in-depth books on building security that are regularly updated. These guidelines aim to foster a rigorous, clear, and professional standard for all our publications, ensuring they remain valuable resources for the community.
@@ -16,7 +16,7 @@ For detailed guidelines on creating papers and delivering artifacts, refer to [P
16
16
17
17
### 1. Content Quality
18
18
19
-
-**Relevance**: Ensure all content is relevant to the topic and objectives of the publication.
19
+
-**Relevance**: Ensure all content is relevant to the topic and objectives of the publication, as well as the mission of TAG Security.
20
20
-**Accuracy**: Verify all facts, figures, and citations. Ensure all information is current and correct.
21
21
-**Comprehensiveness**: Cover the topic thoroughly, providing a clear and complete picture. Avoid unnecessary jargon and ensure the content is accessible to the target audience.
22
22
-**Clarity and Coherence**: Maintain a logical flow of ideas. Ensure that each section transitions smoothly to the next and that the overall structure supports the document’s objectives.
@@ -25,7 +25,7 @@ For detailed guidelines on creating papers and delivering artifacts, refer to [P
25
25
26
26
-**Title and Abstract**: Provide a clear, concise title and abstract that summarize the main points and objectives.
27
27
-**Sections and Headings**: Use clear and descriptive headings. Ensure that the document is divided into well-defined sections (e.g., Introduction, Background, Core Concepts, Implementation, Case Studies, Conclusion).
28
-
-**Introduction**: Offer a compelling introduction that outlines the purpose and scope of the document.
28
+
-**Introduction**: Offer a compelling introduction that outlines the purpose and scope of the document. For really short documents, like blog posts, a dedicated introduction section might be skipped, but at least an introductory paragraph is generally recommended.
29
29
-**Conclusion**: Summarize key findings and provide actionable recommendations or next steps.
30
30
31
31
### 3. Writing Style
@@ -52,7 +52,7 @@ For detailed guidelines on creating papers and delivering artifacts, refer to [P
52
52
53
53
### 7. Review and Revision
54
54
55
-
-**Peer Review**: Submit the document for peer review by knowledgeable individuals within the consortium. Incorporate feedback and revisions as needed.
55
+
-**Peer Review**: Submit the document for peer review by knowledgeable individuals within the community. Specifically, documents should be posted to the #tag-security channel for feedback. Incorporate feedback and revisions as needed.
56
56
-**Proofreading**: Conduct thorough proofreading to eliminate grammatical, typographical, and formatting errors.
0 commit comments