Saturday, July 28, 2012

Research Journal: Part 8

Search Tools

DuckDuckGo.com
-Features

DuckDuckGo is location aware, you can type in time or weather to get the current time or weather based on location.

DuckDuckGo doesn't store any kind of personal information such as an IP address.

The use of Backslash (\) will let you go to the first page of the results list.

Using the format !safesearch you can turn safesearch off for search results.

Typing heads or tails emulates a coin flip.

Ixquick.com
-Features

Ixquick doesn't keep any personal information.

Ixquick searches the other search engines databases and combines them.

It has a starring system to show if other sites also have a page as the top rank.

You can use Ixquick to search in 18 languages.

Ixquick has a feature that you can check if you like a result or not, so that it can know what to show or not show.

Vlib.org
-Features

Sites are reviewed before being added to database.

Subject areas are searchable.

Search is possible in multiple languages.

General categories are broken down into subcategories.

Lists  type of record.





Wednesday, July 25, 2012



Research Journal Part 7

1) Search Statement

The search statement I used was "computer forensics" and "cyber crime", I tried other synonyms and other methods but this gave me the most relevant results to the field. My original search statement was "computer forensics" and (protect or guard) and "cyber crime", this gave a few results but eliminating (protect or guard) gave more relevant results.


2) Popular Magazine Citation

Works Cited

Rist, Oliver. "Your PC's Been Arrested--Now What?." PC Magazine 27.1/2 (2008): 128. Academic Search Premier. Web. 25 July 2012.

I chose this article as it's from PC Magazine which I'm familiar with as being a popular magazine, as well as the database labeling it as one. I know that this pertains to my topic as it's subject terms contain the words "Computer Crimes" as well as computer security. Quickly skimming this article shows that it's about protecting your business after having your computer seized for a computer crime.

3) Scholarly Journal Citation

Work cited

Grabosky, Peter. "Requirements of Prosecution Services to Deal with Cyber Crime." Crime, Law and Social Change 47.4-5 (2007): 201-23. ProQuest Research Library. Web. 25 July 2012.

I chose this article as after skimming the article it shows how the law handles cyber crime issues which is relevant to my topic. It is listed as from a scholarly journal on Proquest. The article dates 2007 which is recent enough for my topic. after research the publisher I found that they were a reputable source of peer reviewed scholarly journals.

4) Newspaper Citation

Works cited

Fields, Gary. "Cyberexperts and Engineers Wanted by FBI." Wall Street Journal: B.1. Los Angeles Times; National Newspapers Core; The Wall Street Journal. Apr 06 2004. Web. 25 July 2012 .

I chose this article as it's published by Wall Street Journal which I know is a reputable newspaper, as well as being listed as one on ProQuest. Skimming the article showed me that this article was about FBI agents hiring computer engineers to become computer forensics specialists. This article also pertains to my search results.

5) Summary

As I was searching through the databases with my original search terms I wasn't finding many results but a few, and they weren't as specific as I wanted them to be. I found eliminating some words led to more search results that were relevant to my topic. I feel like I really got used to using the databases now, and I'm confident that they will be invaluable to my college career. I've done some research papers in other classes and wasn't aware of the resources we have available here at Clark, but these are pretty powerful tools.

Saturday, July 21, 2012

Research Journal Part 6 - Boolean Operators

Practice Research Statements
  •  Is a vegetarian diet healthier than a meat based diet?
    • vegetarian and health* and "meat based" and diet 
  •  Is the current lack of sunspot activity affecting global warming?
    • "sunspot activity" and "global warming"
  •  Debate the pros and cons of fish farming 
    • (pros or positives) and (cons or negatives) and "fish farming"
  •  How much more can a college graduate expect to earn over
     someone with a high school diploma?
    • "college graduate" and earn* and "high school" and diploma
  •   What breeds of dogs make good therapy pets?
    • dog and  breeds and "therapy pets"

Research Question - Search Statement

  •  How do computer forensics protect society from cyber crime?
    • "computer forensics" and (protect or guard) and "cyber crime"

Wednesday, July 18, 2012

Research Journal Part 5

Cannell Library Book Catalog
  • For search terms I used Internet  privacy
  • Citation information:
    • Author: Levmore, Saul X, Nussbaumm, Martha Craven
    • Title: The offensive Internet: speech, privacy, and reputation
    • City of publication: Cambridge, Mass
    • Publisher: Harvard University Press
    • Publication Date: 2010
  • Subject headings: Internet, Law and legislation, Libel and slander, Right of privacy
  • This is a circulating book 
  • Location: Cannell Library second floor, Call number: KF390.5.C6.O344 2010
  • This book is credible because the book was published in 2010 so it's current to my topic, it's published by Harvard University Press., the author graduated from Harvard University and the author has a few other books on humanities. 
Summit Catalog 
  • For search terms I used Internet privacy
  • Citation information:
    • Author: Solove, Daniel J
    • Title: The future of reputation : gossip, rumor, and privacy on the Internet
    • City of publication: New Haven
    • Publisher: Yale University Press
    • Publication date: 2007
  • Subject headings: Right of privacy, Internet, Law and legislation, Reputation (Law), Libel and slander, Personality (Law)
  • Location: CCC General Collection, call number: 342.0858 So4 2007 this is at a partner location on Summit. 
  • This book is credible because of it's the age of the book is relevant to my topic, it's published by an academic publisher, Yale University Press, the author has written 10 books on this subject.
Books 24x7
  • This resource is amazing, I have spent upwards of $600 on books that this site contains, what a great resource available to Clark student, I will make good use of it. You can search for titles using 3 different fields simultaneously and select different options in each drop down box such as full text or title, using multiple fields you can combine them for a more comprehensive search. The search also allows for searching authors, helpful when needing to verify an authors credentials.
Google Books
  • Search terms used: Internet privacy
  • Citation information:
    • Author: Kevin J. Connolly
    • Title: Law of Internet Security and Privacy
    • City of publication: US, city not listed
    • Publisher: Aspen Publishers Online
    • Publication date: 2003
  • The author is a member of the Internet Policy Advisory Board, and the Internet Policy Advisory Body in Geneva, Switzerland. The author has a background in law. The date is recent enough to be useful for my topic and relevant today.  
Summary

I really felt that the Summit catalog was the most useful for my topic, though 24x7 gets a honorable mention. I liked Summit's interface the most, found it very easy to use, very clean looking. It has many types of book formats that are searchable, braille and music notes included. It has the most search options available being able to narrow languages, what type of audience, what country authors the book and more. However my main pursuit here at Clark is Computer Engineering so for future use 24x7 will be very valuable.
 

Saturday, July 14, 2012

Research Question Answers

1) Is a vegetarian diet healthier than a meat-based diet? Academic journals would be most useful because they provide research on a focused topic like this one, as well as being factual information from a scholars.

2) Target often forces musicians to alter lyrics in order to have their CDs sold in Target stores. Is this censorship? Websites would be the most useful resource as they can provide expert and popular opinions, company information, also a great way to start researching the topic.

3) How much more can a college graduate expect to earn over someone with a high school diploma?
Reference books would be the most useful as they provide statistical information.

4) Should educators use commercial services to combat plagiarism?
Official web sites would be the best way to research this question because you can find expert opinion from educational professionals.

5) Is the current lack of sunspot activity affecting global warming?
Scholarly journals would be the most useful because we can find information written by experts in this subject as well as having factual documented evidence.

6)  How can the the American people keep their privacy while maintaining a digital life?
Magazines would be the most useful resource because we can find opinions of popular culture, also finding this resource is useful for finding up to date information.

7) How do computer forensics protect society from cyber crime?
Scholarly journals would be the most useful because we can find information on a focused topic that is factual and supported by evidence.

8) What freedoms do we give up under the USA Patriot Act?
Reference books would be the most useful because we can look up exactly what the law entails.

Tuesday, July 10, 2012

Research Journal Part 3: Summary

I've learned from this unit how much resources we have with Clark. I never seen the GVRL and there is so much useful information there, wish I knew about it in my English classes. I never used Wikipedia for any college assignments as I know that it's not allowed in most situations, so I would often use online sources that I knew were credible such as NPR, or CNN. The database that GVRL has is really extensive though and I plan to use it for future work. I learned a lot from the lesson of how to narrow a research topic, how to narrow a topic down so there isn't to much information.

Research Journal Part 3: Search Questions

Research questions:

1) How can the the American people keep their privacy while maintaining a digital life?

2) How do computer forensics protect society from cyber crime?

3) What freedoms do we give up under the USA Patriot Act?

Research Journal Part 3: Wikipedia

My topic Internet, specifically Internet privacy.

The tool I used is Wikipedia.

Keywords:
  •  Surveillance
  • Anonymity
  • Computer privacy
  • Personally-identifiable information
  • Evercookies
  • Computer forensics
  • Device fingerprinting
  • Data logging
  • USA Patriot Act
  • Malware
  • Magic Lantern
  • Phishing
  • Internet censorship
  • Data retention
  • Privacy-enhancing technologies
  • Anonymous blogging
Citation from Wikipedia's Citation tool

Wikipedia contributors. "Internet privacy." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 9 Jul. 2012. Web. 11 Jul. 2012.

Research Journal Part 3: Exploring Topics

My topic: Internet, specifically internet privacy

To gather the information for this research journal entry I used Gale Virtual Library.

The keywords I gathered are:

  • Internet and the church
  • Internet surveillance
  • Web sites
  • Internet security
  • Social networking
  • Privacy
  • Identity theft
  • E-mail
  • Cyberculture
  • Technology and society
  • Internet fraud
  • Computer medicated communication
  • Digital divide
  • Computers 
  • Anonymity
Title of the article: Internet Privacy
Author of article: Jeffrey Wilson
Title of the Source: Gale Encyclopedia of Everyday Law
Publisher, city, and date: Gale, Detroit, July 2006. P# 1033-1039

Saturday, July 7, 2012

Unit 2: Plagiarism

1)  This paragraph uses citations accurately as this is the persons own experience and does not require citation.

2) This paragraph should cite the constitution as it is paraphrased from it and needs an citation at the beginning of the paraphrase.

3) In this paragraph the author fails to cite where the data 57% is from, this needs to be cited. This should have an citation at the end of the sentence.

4) This paragraph requires a citation at the beginning as it uses the ideas of the main article but in the authors own words.

5) This paragraph is properly cited.

6) This paragraph should be cited at the bottom, though the quotations are in the right place their isn't a proper citation at the end.

7) This sentence doesn't require citation as it's the authors own discovery.

8) This sentence is common knowledge therefore doesn't need citing.

From this assignment I've learned when it is unnecessary to cite sources such as information that is common knowledge, or my own ideas and opinions. I've learned when it is a must to cite sources such as using the exact words of someone else or when paraphrasing their ideas. Basically if you didn't write it yourself, or it's not something everyone knows cite it. I've also learned that we must cite in different part of the text depending on how we used another person's material, such as when we paraphrase someone else's material that we need to cite at the end of the paragraph. I will be avoiding plagiarism mostly by using common sense, if I know It's not my work or idea, I'll cite it, and otherwise if I'm not sure I'll ask. Also to ensure that I will avoid plagiarism I've bookmarked the Purdue page and will use it as a reference.

Tuesday, July 3, 2012

From this assignment I've learned to set up and create a blog, and how easy it is to do. The assignment required us to watch a video of how to setup our blog, then do so. After we setup our blog we were then to customize our blog with a background as well as add a photo. The difference between using this digital workspace and an analogue one is that a digital workspace is much easier to collaborate with others, and your ideas can reach a broader amount of people. I'm also on Facebook and Twitter though I don't use Twitter to often.