1
Keshav S. How to read a paper. ACM SIGCOMM Computer Communication Review. 2007;37. doi: 10.1145/1273445.1273458
2
Tufte ER. The cognitive style of powerpoint. Cheshire, Conn: Graphics Press 2003.
3
Michael Alley. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. Springer; 2nd ed. 2013 edition (April 30, 2013) 2013.
4
Alley M. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. New York: Springer 2003.
5
Report of Columbia Accident Investigation Board. ;1.
6
Urban T. Doing a TED Talk: The Full Story. 2016. http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html
7
Tufte ER. The visual display of quantitative information. 2nd ed. Cheshire, Conn: Graphics Press 2001.
8
Tufte ER. Beautiful evidence. Cheshire, Conn: Graphics Press 2006.
9
Tufte ER. Envisioning information. Cheshire, Conn: Graphics Press 1990.
10
Tufte ER. Visual explanations: images and quantities, evidence and narrative. Cheshire, Conn: Graphics Press 1997.
11
Dittrich D, Kenneally E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research.
12
The Belmont Report. 18 AD.
13
Edwards MA, Roy S. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environmental Engineering Science. 2017;34:51–61. doi: 10.1089/ees.2016.0223
14
Zhu Y. Surveillance, whistleblowing, and security engineering. 2016. https://diracdeltas.github.io/blog/surveillance/
15
Which Stats Test. http://methods.sagepub.com/which-stats-test/
16
Herley C, Oorschot PC van. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. 2017 IEEE Symposium on Security and Privacy (SP). IEEE 2017:99–120.