Friday, August 3, 2012

My Webpage

Building a Webpage

Building this webpage was very similar to what Blogger does for me when I add to my research journal. Instead of having to manually type tags into blogger it does it for us when we click the buttons such as bold or italic <b></b> <i></i>. Learning to make webpages really shows us the power of the web, and how easy it is to make sophisticated pages rather easily. It also shows how when we look for sources, how easy it is for anyone to make a page and give us false information, which leads to how important it is for us to verify sources of our information. HTML really appeals to me because I really love programming, and creating things with computers in general. I've always had a knack at it and this refresher reopens HTML for me. I had fun building this webpage.

Internet Research - Final


Final Exam

-Locating a deep web resource.
Distad, M. (2011). The Future of Print: The Book. Feliciter, 57(5), 182-184
To locate this title I went to Clark’s library website and clicked the article and databases link, and then started searching for the author in a few of the deep web resources. I ended up finding this title by searching for the authors name (Distad, M) in EBSCOhost. After searching the author’s name, this title showed up as the first result.

-Locating an open web resource. 
Morrison, E. (2011, August 22). Are books dead, and can authors survive? The Guardian
To locate this article using an open web resource I went straight to books.google.com. Once there I searched for the title of the article (Are books dead, and can authors survive?). Searching for the title I found it right away as the first search result.

A.S.P.E.C.T
A: Authority
Deep Web
For our deep web resource “The Future of Print: The Book” we will look at the authority of this book to evaluate using A.S.P.E.C.T. When evaluating the authority of a source we look at the author and publisher to find the authors credentials as well as the reputation of the publisher. Looking at the biography at the end of this article we see that the author is a librarian at multiple universities, and has written other books on the subject of libraries. Upon searching the publisher using an open web resource we can see that they publish a magazine dedicated to libraries in Canada and are known for having writers that are professionals in their field.
Open Web
For our open web resource “Are books dead, and can authors survive?” We will also evaluate the authority of this article.  Using an open web resource and searching for the author I found his blog that has a short biography as well as other work he’s done. There is another title that he has written named “The Last Book You’ll Read” as well as detailing his career as a writer. This article is about writing and it is future so showing that his career as a writer shows his authority. The publisher “The Guardian” however publishes articles of all types and use freelancers, and is not a very good indication of authority.
S: Sources
P: Purpose
Deep Web
Using A.S.P.E.C.T to evaluate sources we now look at the “S” or sources. Sources are basically where the author received his information or works cited. In this deep web article “The Future of Print: The Book” it does not contain a works cited page though it does have in text citations. The author cites “The End of Books,” as well as “As We May Think.” The purpose of this article is to speculate the future of the book industry.
Open Web
We will again evaluate the sources of our open web resources. The article “Are books dead, and can authors survive,” doesn’t contain a works cited page as well, but the article does cite a few web pages mostly for statistics. The pages of statistics do contribute to the article though I feel that they are used to further the author’s biased opinion. The purpose of the article seems to portray the book industry as a dying media, but without enough material to maintain credibility. I don’t feel that this article looks at both sides of this issue very well.
E: Evenness
C: Coverage
T: Timeliness  
Deep Web
We get to the last 3 parts of the A.S.P.E.C.T method of evaluating resources, evenness, coverage, and timeliness. I will first apply this to our deep web resource “The Future of Print: The Book.”  My overall impression of this article’s evenness was that the author looked at both sides of the issue and I didn’t detect much bias. The author covers issues about how researchers and speculators in the past have foretold of media dying out and still surviving, or even evolving into new formats. For such as specific topic I feel that this article did well for coverage. This article was published last year so the information is still current as information of this type needs to be.

Open Web
Looking now at our open web resource we can evaluate this resource using A.S.P.E.C.T. Looking at this article and evaluating the evenness of the article I found that it is very biased. The author is really trying to push the idea that books as a media will die and that is just speculation. The author does cover a lot of ground citing numerous statistics, and many sources. Looking at timeliness of this article we find that it is a very recent article just written in August of last year.

Are these articles Trustworthy?
After my evaluation with using A.S.P.E.C.T and applying it to the Deep Web resource I found the article to be trustworthy, not very biased, from a good source and publisher, and written recently. In contrast, the Open Web resource I didn’t find it trustworthy as the bias of the author was very present. Though most of his research is purely speculation he portrays the information as fact.
 
Review of “Are books dead, and can authors survive?”
Author Ewan Morrison answers the question “Will books, as we know them, come to an end?” coming to a doom and gloom conclusion that books will become obsolete, and authors will be out of work. Ewan Morrison in the first paragraph of his article states the answer to this question is “yes, absolutely, within 25 years the digital revolution will bring about the end of paper books,” but he uses mostly speculation to back up this claim. This article isn’t really about the end of the book as it is about the end of authors. Morrison speculates that because so much of the content that we receive is free, that we will in turn only consume free media, eliminating the need for paid authors, moving towards literature written by the layman.
I don’t feel that we as a society will ever be to the point that we have no need for authors or physical books. Though so many more people consume media digitally the readers are still not as easy to read and annotate as physical media. The learning effect of physically annotating text with a highlighter is said to allow a better understanding of the material, moving it from short-term memory to long-term with active processing. Much of are literature here in the US comes from authors who are college educated, often possessing a Master’s degree. Though anyone can write compelling literature, to write great literature does require a specific education.
Morrison makes a compelling argument of how piracy will lead to author’s demise.  Piracy has led to loss of profits around the many media industries, such as music, gaming, and movies. However what Morrison doesn’t hit on is that piracy is illegal and is becoming more and more of a serious crime. Though it does happen so much with the advent of new technology security gets tighter. Even the VCR had security features that would put lines through movies that people attempted to copy. Pirates and people who want to protect their intellectual property will always be locked in the cat and mouse game of piracy. Though technology is getting better at preventing it, the original Xbox was modified by many and very easily to play pirated games, here 10 years later the new Xbox is extremely difficult to do play pirated media on, so much so that it isn’t really done. Recently about 4 days ago a popular pirate site known as Demonoid.me was shut down by hackers known as anonymous in attempt to stop piracy. The laws are getting strict, and the longer we go on the harder it will be to blatantly steal others intellectual property. A new popular video game on the PC known as Diablo has incorporated an anti-piracy mechanism that is close to impervious, simply requiring that the user always be connected to their server, as well as checking if the game files have been modified. Technology like this will become an industry of its own before we will see popular media taken over by pirates. 100% protection from piracy is possible.





Wednesday, August 1, 2012

Research Journal 9

a)  Google.com

b)  These are the search terms I used in Google. "computer forensics" and "cyber crime" site:.com

c)

Britz, Marjie. “Computer Forensics and Cyber Crime: An Introduction - Marjie Britz - Google Books.”             2009. Web. 2 Aug. 2012.

Overill, Richard. “Development of Masters Modules in Computer Forensics and Cybercrime for Computer Science and Forensic Science Students.” ACM Digital Library. Library. May 2009. Web. 2 Aug. 2012.
 Wikipedia contributors. "International Cybercrime." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 19 Jul. 2012. Web. 2 Aug. 2012.
Wikipedia contributors. "Computer forensics." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 31 Jul. 2012. Web. 2 Aug. 2012. 

d)
1. This source was written in 2009 so it is still relevant to my search topic. Also Marjie Britz is the author of multiple books on this subject.
2.This source is from 2009 so it is still current information for my topic. There are many credible sources that are outlined in this article.
3. This source give a broad outline on the topic of cybercrime. The article is very fair, as well as being up to date.
4. This source gives a general overview of the topic computer forensics, this is great for a jumping off point for more information, as well as the article being up to date.

Summary
        I found that .org worked best for my topic, though I found it extremely hard to find reputable sources on the web for my topic, even trying other keywords, with the result of using Wikipedia for sources. Though I know Wikipeida would generally be unacceptable to cite, in this instance I would use it as a jumping off point for more credible information. It's really simple using the databases that Clark provides to find information for this topic, but not so much for mine.

Saturday, July 28, 2012

Research Journal: Part 8

Search Tools

DuckDuckGo.com
-Features

DuckDuckGo is location aware, you can type in time or weather to get the current time or weather based on location.

DuckDuckGo doesn't store any kind of personal information such as an IP address.

The use of Backslash (\) will let you go to the first page of the results list.

Using the format !safesearch you can turn safesearch off for search results.

Typing heads or tails emulates a coin flip.

Ixquick.com
-Features

Ixquick doesn't keep any personal information.

Ixquick searches the other search engines databases and combines them.

It has a starring system to show if other sites also have a page as the top rank.

You can use Ixquick to search in 18 languages.

Ixquick has a feature that you can check if you like a result or not, so that it can know what to show or not show.

Vlib.org
-Features

Sites are reviewed before being added to database.

Subject areas are searchable.

Search is possible in multiple languages.

General categories are broken down into subcategories.

Lists  type of record.





Wednesday, July 25, 2012



Research Journal Part 7

1) Search Statement

The search statement I used was "computer forensics" and "cyber crime", I tried other synonyms and other methods but this gave me the most relevant results to the field. My original search statement was "computer forensics" and (protect or guard) and "cyber crime", this gave a few results but eliminating (protect or guard) gave more relevant results.


2) Popular Magazine Citation

Works Cited

Rist, Oliver. "Your PC's Been Arrested--Now What?." PC Magazine 27.1/2 (2008): 128. Academic Search Premier. Web. 25 July 2012.

I chose this article as it's from PC Magazine which I'm familiar with as being a popular magazine, as well as the database labeling it as one. I know that this pertains to my topic as it's subject terms contain the words "Computer Crimes" as well as computer security. Quickly skimming this article shows that it's about protecting your business after having your computer seized for a computer crime.

3) Scholarly Journal Citation

Work cited

Grabosky, Peter. "Requirements of Prosecution Services to Deal with Cyber Crime." Crime, Law and Social Change 47.4-5 (2007): 201-23. ProQuest Research Library. Web. 25 July 2012.

I chose this article as after skimming the article it shows how the law handles cyber crime issues which is relevant to my topic. It is listed as from a scholarly journal on Proquest. The article dates 2007 which is recent enough for my topic. after research the publisher I found that they were a reputable source of peer reviewed scholarly journals.

4) Newspaper Citation

Works cited

Fields, Gary. "Cyberexperts and Engineers Wanted by FBI." Wall Street Journal: B.1. Los Angeles Times; National Newspapers Core; The Wall Street Journal. Apr 06 2004. Web. 25 July 2012 .

I chose this article as it's published by Wall Street Journal which I know is a reputable newspaper, as well as being listed as one on ProQuest. Skimming the article showed me that this article was about FBI agents hiring computer engineers to become computer forensics specialists. This article also pertains to my search results.

5) Summary

As I was searching through the databases with my original search terms I wasn't finding many results but a few, and they weren't as specific as I wanted them to be. I found eliminating some words led to more search results that were relevant to my topic. I feel like I really got used to using the databases now, and I'm confident that they will be invaluable to my college career. I've done some research papers in other classes and wasn't aware of the resources we have available here at Clark, but these are pretty powerful tools.

Saturday, July 21, 2012

Research Journal Part 6 - Boolean Operators

Practice Research Statements
  •  Is a vegetarian diet healthier than a meat based diet?
    • vegetarian and health* and "meat based" and diet 
  •  Is the current lack of sunspot activity affecting global warming?
    • "sunspot activity" and "global warming"
  •  Debate the pros and cons of fish farming 
    • (pros or positives) and (cons or negatives) and "fish farming"
  •  How much more can a college graduate expect to earn over
     someone with a high school diploma?
    • "college graduate" and earn* and "high school" and diploma
  •   What breeds of dogs make good therapy pets?
    • dog and  breeds and "therapy pets"

Research Question - Search Statement

  •  How do computer forensics protect society from cyber crime?
    • "computer forensics" and (protect or guard) and "cyber crime"

Wednesday, July 18, 2012

Research Journal Part 5

Cannell Library Book Catalog
  • For search terms I used Internet  privacy
  • Citation information:
    • Author: Levmore, Saul X, Nussbaumm, Martha Craven
    • Title: The offensive Internet: speech, privacy, and reputation
    • City of publication: Cambridge, Mass
    • Publisher: Harvard University Press
    • Publication Date: 2010
  • Subject headings: Internet, Law and legislation, Libel and slander, Right of privacy
  • This is a circulating book 
  • Location: Cannell Library second floor, Call number: KF390.5.C6.O344 2010
  • This book is credible because the book was published in 2010 so it's current to my topic, it's published by Harvard University Press., the author graduated from Harvard University and the author has a few other books on humanities. 
Summit Catalog 
  • For search terms I used Internet privacy
  • Citation information:
    • Author: Solove, Daniel J
    • Title: The future of reputation : gossip, rumor, and privacy on the Internet
    • City of publication: New Haven
    • Publisher: Yale University Press
    • Publication date: 2007
  • Subject headings: Right of privacy, Internet, Law and legislation, Reputation (Law), Libel and slander, Personality (Law)
  • Location: CCC General Collection, call number: 342.0858 So4 2007 this is at a partner location on Summit. 
  • This book is credible because of it's the age of the book is relevant to my topic, it's published by an academic publisher, Yale University Press, the author has written 10 books on this subject.
Books 24x7
  • This resource is amazing, I have spent upwards of $600 on books that this site contains, what a great resource available to Clark student, I will make good use of it. You can search for titles using 3 different fields simultaneously and select different options in each drop down box such as full text or title, using multiple fields you can combine them for a more comprehensive search. The search also allows for searching authors, helpful when needing to verify an authors credentials.
Google Books
  • Search terms used: Internet privacy
  • Citation information:
    • Author: Kevin J. Connolly
    • Title: Law of Internet Security and Privacy
    • City of publication: US, city not listed
    • Publisher: Aspen Publishers Online
    • Publication date: 2003
  • The author is a member of the Internet Policy Advisory Board, and the Internet Policy Advisory Body in Geneva, Switzerland. The author has a background in law. The date is recent enough to be useful for my topic and relevant today.  
Summary

I really felt that the Summit catalog was the most useful for my topic, though 24x7 gets a honorable mention. I liked Summit's interface the most, found it very easy to use, very clean looking. It has many types of book formats that are searchable, braille and music notes included. It has the most search options available being able to narrow languages, what type of audience, what country authors the book and more. However my main pursuit here at Clark is Computer Engineering so for future use 24x7 will be very valuable.