Wednesday, October 24, 2012

Unit 5, Research Tools, Narrowing Down a Subject



Choose one book that looks like it could be useful for your topic. Write an entry in your Research Journal, documenting the following:
 Search Term(s) used “privacy concerns” and information and collected and applications and portable and technology and devices
 Citation information for one book: (author, title, city of publication, publisher, publication date) Sylvia Engdahl (book editor), Espionage and intelligence, Detroit, Greenhaven Press, 2012
 Subject Headings (taken from the Subject Field) National security -- Law and legislation -- United States. Electronic surveillance -- Law and legislation -- United States.Espionage -- United States.Intelligence service -- Law and legislation -- United States. 
 Is this a Circulating Book or an E-Book? It is part of a series (current controversies).
 Location and Call Number for the Book - Cannell New Books   KF4850 .E87 2012  
 What clues in the book record lead you to believe that this book is credible, or trustworthy? (Remember the ASAP criteria from IRIS)
The publication is current, includes a long bibliography, the call number is surrounded by reference texts. Related subjects are relevant.

Choose one book in the Summit Catalog that looks like it could be useful for your topic. Write an entry in your Research Journal documenting the following:
 Search Term(s) used “privacy concerns” and technology
 Citation information for one book: (author, title, city of publication, publisher, publication date) Privacy and innovation, Author: Avi Goldfarb; Catherine Tucker; National Bureau of Economic Research.
Publisher: Cambridge, Mass. : National Bureau of Economic Research, ©2011.
 Subject Headings (the field is called “Related Subjects” in Summit) Related Subjects:(2) Privacy, Right of. Technological innovations.
 Location and Call Number for the Book. National Bureau of Economic Research http://papers.nber.org/papers/w17124 or WSU Internet All-WSU ON-LINE  HB1 .W654 no.17124 (Electronic resource)
 What clues in the book record lead you to believe that this book is credible, or trustworthy? Publisher, It is a current working paper.
 How did this search differ from the search in the Cannell Library Book Catalog? This search returned a much larger results list, which was relevant and contained a lot of other possible/related search terms.

In your research journal: Write a paragraph summarizing your experience with IT Pro. Your summary should include a discussion of the fields and search modes you can use to focus your search.
The IT Pro offers multiple search refining tools. Within the general search term you can choose: context, general info (with 5 sub-headings), content and in notes. You can use any/all words, Boolean, or exact phrase. You can restrict the search to specific folders. You can repeat (and use multiples) of the general search field terms within three additional fields, and specify options of  like, before, or after for the copyright year.
Choose one book in Google Books that looks like it could be useful for your topic. Write an entry in your Research Journal documenting the following:
 Search Term(s) used “privacy concerns” and technology
 Citation information for the book: (author, title, city of publication, publisher, publication date) Privacy Protections for Personal Information Online (Google eBook), Gina Stevens, Gina Stevens (au), DIANE Publishing, 2011 - Law - 15 pages
 What clues does Google Books provide that lead you to believe this book is trustworthy? Author is a government official, current, Many references listed, written for the Congressional Research Service.

Summarize this unit.
In your research journal, write a paragraph that summarizes what you took away from this activity. For this unit I learned how use truncation, keyword phrases and a great way to narrow down an idea to a search statement. I was not  previously with Google Books either, even though I have used it before (personal use); I never thought of it as a research tool, but it is actually great in that you can preview much of the text and it provides multiple options for obtaining the material (purchase, library search, etc…)

Truncate words for a successful search Use the *, pet* for pet(s)(ting)etc..
Boolean Operators AND , OR, NOT  

From Idea to Search Statement
What is decisional and constitutional privacy and how does it differ from tort and informational privacy?

“decisional privacy” and “constitutional privacy” and “tort privacy” and "informational privacy"

What are the common “privacy concerns” with and what type of information is and collected by applications when using portable and technology and devices (smartphones, tablets, etc…)?

“"privacy concerns" and information and collected and applications and portable and technology and devices

What are theprivacy concerns” and for an individual using apublic access” and “wireless network”?

“privacy concerns” and “public access” and “wireless network”



1 comment:

  1. Hi, Shane:

    Somehow I failed to post a comment last week even though I graded this, sorry for that. You did a good job exploring each resource and selecting relevant books for your topic.

    As for your search statements, you are getting the idea of identifying key concepts and using boolean connectors, you many want to simplify even more, such as privacy AND ("public access" or open) AND "wireless network"

    Cheers,
    Andrea

    ReplyDelete