A fantastic resource for developing projects for publication – well worth the time to study and emulate.
Guidelines For Historical Research and Writing – Minnesota Historical Society
Initially, we’ll be formalizing our standards and providing some guidelines as follows:
1. All declarative/authoritative statements of fact regarding historical persons, places or things that have been drawn from historical information/resources, will be noted to that information’s primary source. The usual form of a numbered footnote, with the index number tied to the statement, image, etc., shown in the article, post or presentation form.
An example of this: Obnoxiously expressed assertion of certitude.
 Primary source that provides source of obnoxiously expressed assertion of certitude.
2. Any image or visual representation (IVR) used in an article or post that is not the actual creation of the content author should be clearly identified to the original creator or resource. This is critical for determining if the content is from public domain sources, or from other sources that may hold copyright rights to it. For any IVR that is another party’s property, that party will be clearly noted as the original source of the IVR AND evidence of written permission for it’s use on the society website must be received the by society. A log of these permissions will be maintained scrupulously. If a conflict arises regarding the status of a given IVR, this log will be the authority in determining if a IVR is legitimate or not.
3. Regarding secondary sources – sometimes, we find valuable information that has been quoted, paraphased or otherwise included in a source that is not the original primary source. Example – quotes from 1859 cavalry board that have been included verbatim in a USCA journal article. The quote is perceived to be accurate and from that source, but it’s not actually taken from the original document. These will be considered acceptable, if the original document is not accessible, but must be clearly identified as such. This is actually a protection for the researcher, as a former writer may have been selective in their attribution, the reason for which a person may not be able to accurately determine. If a past author selectively quoted an original primary source/document in order to reinforce their conclusion, and ignored contrary evidence in the same document – the secondary resource is compromised. For this reason, secondary resources are deprecated, but allowed if they are the only ones available at the moment.
4. All articles will be identified to an author wherever possible. If a particular author requires anonymity, then a pseudonym may be assigned that is used for all materials produced by that author.