Wednesday, October 31, 2012

Unit 6 More on Search Strategies

I am continuing on last weeks post in which I got a little ahead of things and already completed portion two of this exercise for all three of my own search statements. In this week's post I am listing my five statements, whcih I chose from the provided list. they are as follows:

Will presidential election reform solve the issues with the Electoral College and the popular vote?

  • “presidential election” AND  reform  AND “ Electoral College” AND “ popular vote” 

Does television advertising by the pharmaceutical industry have an impact on prescription drug abuse?

  • television AND advertis* AND pharmaceutical AND  prescription AND abuse 

What breeds of dogs make good therapy pets?

  • breed*  AND  (dog* OR canine*) AND therapy

Is the current lack of sunspot activity affecting global warming?

  • “sunspot activity” AND “global warming
Is a vegetarian diet healthier than a meat-based diet?

  • vegetarian AND diet  AND health* AND mea

Wednesday, October 24, 2012

Unit 5, Research Tools, Narrowing Down a Subject



Choose one book that looks like it could be useful for your topic. Write an entry in your Research Journal, documenting the following:
 Search Term(s) used “privacy concerns” and information and collected and applications and portable and technology and devices
 Citation information for one book: (author, title, city of publication, publisher, publication date) Sylvia Engdahl (book editor), Espionage and intelligence, Detroit, Greenhaven Press, 2012
 Subject Headings (taken from the Subject Field) National security -- Law and legislation -- United States. Electronic surveillance -- Law and legislation -- United States.Espionage -- United States.Intelligence service -- Law and legislation -- United States. 
 Is this a Circulating Book or an E-Book? It is part of a series (current controversies).
 Location and Call Number for the Book - Cannell New Books   KF4850 .E87 2012  
 What clues in the book record lead you to believe that this book is credible, or trustworthy? (Remember the ASAP criteria from IRIS)
The publication is current, includes a long bibliography, the call number is surrounded by reference texts. Related subjects are relevant.

Choose one book in the Summit Catalog that looks like it could be useful for your topic. Write an entry in your Research Journal documenting the following:
 Search Term(s) used “privacy concerns” and technology
 Citation information for one book: (author, title, city of publication, publisher, publication date) Privacy and innovation, Author: Avi Goldfarb; Catherine Tucker; National Bureau of Economic Research.
Publisher: Cambridge, Mass. : National Bureau of Economic Research, ©2011.
 Subject Headings (the field is called “Related Subjects” in Summit) Related Subjects:(2) Privacy, Right of. Technological innovations.
 Location and Call Number for the Book. National Bureau of Economic Research http://papers.nber.org/papers/w17124 or WSU Internet All-WSU ON-LINE  HB1 .W654 no.17124 (Electronic resource)
 What clues in the book record lead you to believe that this book is credible, or trustworthy? Publisher, It is a current working paper.
 How did this search differ from the search in the Cannell Library Book Catalog? This search returned a much larger results list, which was relevant and contained a lot of other possible/related search terms.

In your research journal: Write a paragraph summarizing your experience with IT Pro. Your summary should include a discussion of the fields and search modes you can use to focus your search.
The IT Pro offers multiple search refining tools. Within the general search term you can choose: context, general info (with 5 sub-headings), content and in notes. You can use any/all words, Boolean, or exact phrase. You can restrict the search to specific folders. You can repeat (and use multiples) of the general search field terms within three additional fields, and specify options of  like, before, or after for the copyright year.
Choose one book in Google Books that looks like it could be useful for your topic. Write an entry in your Research Journal documenting the following:
 Search Term(s) used “privacy concerns” and technology
 Citation information for the book: (author, title, city of publication, publisher, publication date) Privacy Protections for Personal Information Online (Google eBook), Gina Stevens, Gina Stevens (au), DIANE Publishing, 2011 - Law - 15 pages
 What clues does Google Books provide that lead you to believe this book is trustworthy? Author is a government official, current, Many references listed, written for the Congressional Research Service.

Summarize this unit.
In your research journal, write a paragraph that summarizes what you took away from this activity. For this unit I learned how use truncation, keyword phrases and a great way to narrow down an idea to a search statement. I was not  previously with Google Books either, even though I have used it before (personal use); I never thought of it as a research tool, but it is actually great in that you can preview much of the text and it provides multiple options for obtaining the material (purchase, library search, etc…)

Truncate words for a successful search Use the *, pet* for pet(s)(ting)etc..
Boolean Operators AND , OR, NOT  

From Idea to Search Statement
What is decisional and constitutional privacy and how does it differ from tort and informational privacy?

“decisional privacy” and “constitutional privacy” and “tort privacy” and "informational privacy"

What are the common “privacy concerns” with and what type of information is and collected by applications when using portable and technology and devices (smartphones, tablets, etc…)?

“"privacy concerns" and information and collected and applications and portable and technology and devices

What are theprivacy concerns” and for an individual using apublic access” and “wireless network”?

“privacy concerns” and “public access” and “wireless network”



Wednesday, October 17, 2012

Unit 4, Post 2, My Questions, Possible Sources


What is decisional or constitutional privacy and how does it differ from tort or informational privacy?

For this question, I would use the internet to find definitions for the mentioned terms. I would expect to find common definitions and examples of how they differ.

What are the common privacy concerns with and what type of information is collected by applications when using portable technology devices (smartphones, tablets, etc…)?

For this question, I would use academic journals. I would expect to find articles written by experts in the field giving information in technical terms.

What are the privacy concerns for an individual using a public access wireless network?

For this question, I would use the books, specifically textbooks because they would be the most current source for relevant information. I would also use the internet to review privacy policies for actual public networks.

Unit 4, Post 1, Practice Questions


Practice Questions

1) Is a vegetarian diet healthier than a meat-based diet?

a. I would use books or E-books for this topic. I would expect to find lots of detailed information from authors who specialize on the subject.

2) Target often forces musicians to alter lyrics in order to have their CDs sold in Target stores. Is this censorship?

a. I would use academic encyclopedias. I would expect to get a general overview on the subject of censorship, perhaps referencing some past instances. 

3) How much more can a college graduate expect to earn over someone with a high school diploma?

a. I would use websites to research this question. I would expect to find comparative information from various sites, to include references to surveys and actual data. The Department of Labor and Industries would probably be a good start.

4) Should educators use commercial services to combat plagiarism?

a. I would use the internet to research this topic. I would expect to find websites or blogs by educators discussing the issue (pros and cons) and notating personal experiences.

5) Is the current lack of sunspot activity affecting global warming?

a. I would use academic journals for this topic. I would expect to find scientific research demonstrating results through documentation and experiments.


Wednesday, October 10, 2012

The BEST computer fact ever if its actually true,, found @ http://www.computerhope.com/history/198090.htm
1981Jeff Dailey, a 19-year old becomes the first person to die from computer gaming after dying from a heart attack after posting a score of 16,660 on Berzerk.

Sunday, October 7, 2012

Unit 3, Post #4 Exercise Summary


What I learned in the exercises from this unit are some new key terms for types of research, in particular, the Deep/Invisible web and Subject Encyclopedias. The Deep/Invisible web contains scholarly written articles, peer reviewed articles, academically accepted databases, and much more. Many of these are fee-based resources, which are available to us for no-charge as students; the college has already paid for the access. The Subject Encyclopedias are a great tool for starting an initial search on general topic, limiting your results to academically sound material. You can find keywords, key authors, and related or previously sourced articles.

Wikipedia is a good “general” search tool; I like to use it for the resources it provides in the form of related articles and links to other sites. Wikipedia is not an acceptable source for academic papers requiring citations.

Unit 3, Post #3 Exploring topics


From the “Explore Topics” tutorial on IRIS I learned how to utilize the initial subject keywords list I made to come up with some specific questions. These will help narrow down the general subject I started with, privacy, to a more specific topic possibility. The questions I have developed thus far are:
  1. What is decisional or constitutional privacy and how does it differ from tort or informational privacy?
  2. What are the common privacy concerns with and what type of information is collected by applications when using portable technology devices (smartphones, tablets, etc…)?
  3. What are the privacy concerns for an individual using a public access wireless network?

Unit 3, Post #2, Wikipedia for a subject search


On October 7, 2012, I used the Wikipedia.org search feature for the general topic of “privacy”. I found a definition and history of the word in addition a long list of related topics, which I am using for my keywords from the site. The following keywords related to my subject were “see also” topics: Civil liberties, Digital identity, Expectation of privacy, Information privacy, Information privacy law, Nineteen Eighty-Four, Personal rights, Mind your own business, Privacy law, Privacy laws of the United States, Privacy policy, Privacy Rights Clearinghouse, Privacy software, Private sphere, Privacy-enhancing technologies, Profiling practices, Public figure, Solitude, and Surveillance. The search process resulted in a noticeably different type of information in the results. It immediately displayed short blurbs of publicly edited entries of general types of privacy categories along with some historical information, in contrast to the more specific articles found with "deep web" searching. The article had been edited as recently as September 27, 2012.

The Wikipedia.org has a lengthy page regarding citing them as source at http://en.wikipedia.org/wiki/Citing_Wikipedia#Citing_Wikipedia. It is generally recommended that Wikipedia only be used as a “general source”, not as a “primary source”.

Unit 3, Post #1, GVRL subject search


On October 7, 2012, I used the Gale Virtual Reference Library (GVRL) search feature for the general topic of “privacy”. I found two interesting articles (the first article yielded only about 13 keywords of interest so I skimmed a second, related article from the choice to “narrow down” by selection with a subcategory. This produced the following keywords related to my subject: internet, technology, ethics, constitutional privacy, decisional privacy, tort privacy, informational privacy, nanotechnology, communication, spyware, bio-metrical data, authentication, data protection, transaction-generated information, panoptic environment, hackers, internet, firewall, network security, cyber-criminals  plagiarism, viruses, hypertext, and GPS. The search process was easy and the exercises performed on the IRIS website were helpful. From the “Research Notes” section, I used their suggestions for capturing information to use in this blog. I also captured the citation information with my Zotero software, another recommendation from the IRIS tutorials. I will refer back to these two, general subject encyclopedias, and their sources should I perform more research on this subject. This initial process only took about an hour.

Source article #1
Van Den Hoven, Jeroen. "Privacy." Encyclopedia of Science, Technology, and Ethics. Ed. Carl Mitcham. Vol. 3. Detroit: Macmillan Reference USA, 2005. 1490-1492. Gale Virtual Reference Library. Web. 7 Oct. 2012.

Source article #2
Johnson, Deborah G. "Computer Ethics”. Encyclopedia of Science, Technology, and Ethics. Ed. Carl Mitcham. Vol. 1. Detroit: Macmillan Reference USA, 2005. 392-398. Gale Virtual Reference Library. Web. 7 Oct. 2012.

Tuesday, October 2, 2012

Unit 2: Plagiarism


All examples listed are from the http://owl.english.purdue.edu/owl/resource/589/04/ website.

1. Last summer, my family and I traveled to Chicago, which was quite different from the rural area I grew up in. We saw the dinosaur Sue at the Field Museum, and ate pizza at Gino's East.

  • I see no plagiarism issues with this statement. 

2. Americans want to create a more perfect union; they also want to establish justice, ensure domestic tranquility, provide for the common defense, promote the general welfare, and secure the blessings of liberty for everybody.

  • If this is the author’s own thoughts then there is no plagiarism, however the text reads more as though this may be a paraphrase of someone else’s work, in which case they need a proper citation.

3. I find it ridiculous that 57% of high school students think their teachers assign too much homework.

  • This item contains plagiarism in that no citation is given for the statistic. Citation needs to be inserted.

4. Martin Luther King was certain that nobody would want to be contented with a surfacy type of social analysis that concerns itself only with effects and doesn't deal with root causes.

  • This statement contains plagiarism in that the author is paraphrasing but has failed to list and credit their source.

5. Martin Luther King wrote that the city of Birmingham's "white power structure" left African-Americans there "no alternative" but to demonstrate ("Letter from the Birmingham Jail" para. 5).

  • This statement includes plagiarisms in that only select text is contained by quotation marks while the author clearly borrowed additional phrases. The quotations need to encompass all of the borrowed text.

6. In "Letter from the Birmingham Jail," King writes to fellow clergy saying that although they "deplore the demonstrations taking place in Birmingham, your statement fails to express a similar concern for the conditions that brought about the demonstrations."

  • This statement has an incorrect use of quotation marks; the author cited King, but quotations around his paraphrasing and listed no page number. The author could either re-work without quotations, or restructure to include King’s exact words.

7. My friend Kara told me that she loves living so close to the ocean.

  • No citation is needed.

8. Americans are guaranteed the right to freely gather for peaceful meetings.

  • No citation necessary as this should be common knowledge, but they could cite the Constitution.


Summary

What I have learned about plagiarism through this exercise was primarily a refresher to what I have learned in ENG101 & ENG102. Although, as a student in particular, refreshers on this subject can only be helpful as they are of the utmost importance. It is imperative to take notes as you conduct research, in fact, start your bibliography before your note taking. It is very easy to lose track of a source location or the exact wording from a quote, or even to forget if the thoughts in your mind were your own or something you came across. There are many resources at our disposal to ensure we do not commit plagiarism as students. There are many free resources on the web, like the Purdue Owl website in addition to the style manuals, which are readily available and often required for course work. Of course, we also have our Clark website and our librarians, which we can use for assistance. There are many other resources like functions within Microsoft Word or citation software (I personally have used Zotero), which can assist you with inserting citations and creating bibliographies. Plagiarism is not only offensive to the original source, but it is illegal and can easily get you removed from a class or a school as a disciplinary action. Its instances are not limited to failed citations, but also include distortion or misrepresentation of facts and reusing your own work for school assignments. Plagiarism is bad, do not do it, and when in doubt, cite.