Friday, October 29, 2010

note to Andrea B.

here is a comment re: your comment (unit 4):
hi A.B. thanx for the comment. what is meant by "the other for other" research needs. Can you address this in class mon (nov. 1)

note to Instructor

Hello Andrea, i sent you an email regarding this unit and additional posts (already graded?) I suppose you can "update" the grade? Also, some of the title(s) to this blog's post may be misnamed (i.e. unit 5, instead of 6). Larry Bernal

RJ-3 Summary

My experience gained from this unit is to continue to learn to refine my searches, particularly in 2 areas: a) reducing the # of results using boolean, and B) finding specific types of content thru the links from the Dbase 1st page, i.e, magazines and articles; and continuing to change the search statement for different paths to follow or better or more focused results>

Unit 6-RJ3- Pop Magazine

Dbase used: ProQuest, magazines.
Popular Magazine: "Popular Mechanics", article:, "The Machines... are Watching"
>citation: Michael Kaplan. "The Machines... are Watching. " Popular Mechanics 1 Jan. 2010: Platinum Periodicals, ProQuest. Web. 29 Oct. 2010.
>> summary: i picked this magazine because i am familiar with it, (over 20 yrs popular), and i like the 'not necessarily' expert(s) point of view. The everyday persons viewpoint, but of topic and information addressed to the inquisitive.

RJ3-unit 5-POST #2

Newspaper choice:
Search statement:
> "internet and business and security"
Dbase used: ProQuest, Newspapers link.
>> Article: "Experts Warn of a Weak Link in the Security of Web Sites"
Annotation: The article was written in the New York Times, a major publication which is widely read (business section). Also the article identifies a 'weak' link, that being the authenticating of websites that use/provide e-commerce, with sensitive data/info (i.e. bank acct. info)being shared and transferred through these sites. CONTENT is the main reason i picked this article, then source. In addition, the subjects listed (@ bottom) include all of the relevent topices, (e.g. Computer security, Data encryption, Web browsers, Certification, Web sites, Network security).

Wednesday, October 27, 2010

Unit 6-RJ-periodicals

"Internet theft is avoidable"
citation: (MLA)
Cherry, M., and E. Imwinkelried. "Internet theft is avoidable. " Judicature 92.1 (2008): 7-7. Research Library, ProQuest. Web. 27 Oct. 2010.
Why I choose this article?
> This article contained the primary topic i am focusing on, internet security, but the abstract included the relationship of business security from the consumers point of view, which takes into acct. both sides, not just the co. perspective. the indication is that consumers need to be more proactive and be attentive to which companies do a better job of the 'security' issue.
>> there is also the indication of the 'legal' aspects becoming more important with these issues which may point to how the industry might be shaped in the future.
>>> the 2 authors are from 2 different 'expert' disciplines, one in law, the other in 'biometrics' (computer/business security).
>>>> the article is somewhat current (2008), and the periodical listed this article in volume 92, indicating it has stability, continuity and more than likely a broad range of contributors and specific topics.

unit 6-periodicals/RJ notes

Logged into Proquest
> search statement:
internet and privacy and security and business
>> results = 2755 pages found
reduced by using "Advanced Search" option and changed statement
>> 1st result was over 15K results, used the provided suggestion (link)of computer and network security and added 'business' to Src statement: new resutls of 45 docs,
examples are "hackproof dream", "security first", " The causation issue in computer security breach cases" (nice!!), "Virtual machines, virtual security?", and "Internet theft is avoidable".

Friday, October 22, 2010

Noter to Instructor

Hi Andrea, I had to work on wed (missed class), and am still sick. Not able to focus well lately. I'm not sure what you were looking for this week. I used boolean operators on my 3 ?'s from earlier, and turned them into 'search statements'.

unit 5 Boolean/search

My 3 questions:
A What level of privacy can be expected by a Co. or individual on the Internet?
> Search statement: Priva* and internet and compan* and citizen
B How secure is sensitive information?
>> Search statement: internet and secur* and identit* and information
C Will computer/network technology evolve to virtually eliminate intrusion & info theft?
>>> Search statement: computer and future and technology and information and theft

Sunday, October 17, 2010

unit 4: Summary

Each resource has it's plus/minus factors. My preference immediately is the IT Pro for interest and relevance to my study subjects and education major. The Summit and Cannell dbases are peticularly good for citations, and links to other libraries, and availability in the hardback. The google books dbase provides a more general cross section of both 'serious' content and for fun/enjoyment type of reading materials. LB

unit 4 RJ part 2d

GOOGLE BOOKS:
> Search terms: computers;
>> Citation:
Author- Vacca, John R.
Title- Practical Internet Security
City/Publ./date:
N.Y., N.Y.; Springer Science & Business Media
c-2007
>>> Credibility factors: Very in depth book w/36 chaps of tech info, author has security background w/ NASA.

unit 4 RJ- part 2c

Books 24x7/IT Pro
> my experience w/ :
I like IT Pro mostly because it contains alot of the subjects and info i am interested in (i.e. technology, computers, etc.) each author(s) usually many more titles to choose from. The layout of the page is much better. The references include actual 'certification' instruction books. The links (left margin) allow me to search by year (for relevance, or narrowing of search), and offers to choose several more formats, i.e. large print book, computer file, and visual material. LCB

unit 4 Summit Catalog (2b)

Search terms entered: Internet (and) Security
> CITATION INFO:

Beautiful security
by Andrew Oram; John Viega;
Book Summit
Language: English Publisher: Sebastopol, CA : Farnham : O'Reilly, 2009.
>> Related (subjects): Computer networks, Security measures.
>>> Book & eBook,
LOCATION: Summit, & Seattle Pacific University, call #TK5105.59 .B423 2009
Oram, A., & Viega, J. (2009). Beautiful security. Sebastopol, CA: O'Reilly.
>>>> CREDIBILITY: Hardcopy found at 4 colleges, availability: global (libraries), written by "security" experts. part of a series (Theory in practice).
Differences: different layout, have to search entire page for overall info, can be tagged, includes a better synopsis, descriptive info.

Unit 4 RJ-pt 2

logged into Cannell Library website
> typed "internet security" into searchbox
more search terms: "internet and security",, (same results)

> choice 1: "Internet and wireless security"
(choice 2)"Internet security in the Network Computing Framework" (TITLE)
>> citation info:
Added Author Temple, Robert, 1963- Editor.
Regnault, John, Editor.
Books24x7, Inc.
Institution of Electrical Engineers
Norwood, Mass. : Books24x7.com
London : Institution of Electrical Engineers, c2002(Norwood, Mass. : Books24x7.com
>>> Subject Headings: Electronic Commerce, Security, Internet
E-BOOK
LOCATION/CALL #: Books 24X7.com, (no call #)
>>>> CREDIBILITY: Publication info includes Institution of Electrical Engineers, and Source includes bibliographical references.

The

Wednesday, October 6, 2010

Unit 3- Activity

Matching Sources to Needs:
> Ques. 1- "What level of privacy can an individual/company/group expect while using the internet? A good RESOURCE: GVRL (Cannell Library site). REASON: this reference site has an ENCYCLOPEDIA of Science, Technology, & Ethics reference(s) which combines the topics in 1 source.
> Ques. 2- "How secure is personal,sensitive information; is critical information secure enough? A good RESOURCE: IT PRO, (Cannell Library site). REASON: this reference site focuses on topics that are computer/internet related.
> Ques. 3- "Will Computer (software) technology address and evolve to all of the levels of security required by individuals and groups? A good RESOURCE: AccessScience: Encyclopedia of Science & Technology Online, (Cannell Library site). REASON: this source has a Computing/Information tech. link that in turn has various links for new sources based on topic and category within the computing/IT area. (at least 10 more links to new sources, including narrowing/focus search function(s).

Friday, October 1, 2010

RJ- Unit 2- Summary

Mostly that each single idea can be expanded to many levels, facets of the original idea. The better websites, search engines, subject encylopedias open a floodgate for exploration of a subject, especially by use of keywords, and references, but mostly stimulation of the idea, the creative curiosity of the mind. I like both styles of Sources, GVRL, and Wikipedia, one is more academic and formal, the other reads like a 'helpful' friend, with some topics equally well researched. Larry Bernal

RJ- Unit 2- Part 1 (cont.)

Use Open Web: Wikipedia (.org)
> Eenter same search term: Internet
> Additional ideas/terms:
>> 1- Network of networks
2- Information resources
3- Information services
4- Backbone
5- Domain Names
6- Internet conventions
7- Hyperlinks
8- Personally identifiable info.
9- Surveillance
10- Computer forensics

This source (like most Search domains gives a wealth of new topics, sub-topics, and NEW ideas to follow and dig through.

Compose 3 Search Questions:
1- What level of privacy can an individual/company/group expect while using the internet?

2- How secure is personal,sensitive information; is critical information secure enough?

3- Will technology address and evolve to all of the levels of security required by individuals and groups?

RJ-Unit 2-Part 1

1- Workplace set: a)IExplorer, b)4 tabs open
2- Blog is open (LcbServices):
> Everything I think, use, learn and consider will be referred to here.
3- Read the IRIS tut's:
> Explore topics
> Research Notes
> Subject Encyclopedias
> Deep/Invisible Web
> Wikipedia
4- Explore Topic (GVRL)
>>> Major topic: Internet (Search term)
LIST of Keywords/ideas:
1 Internet fraud
2 Tracking and Tracing
3 Privacy
4 Dynamic and Static Addresses
5 Technology and Relationships
6 Spam and Fraud
7 Internet Spider
8 Bulletin Boards
9 Cyber-culture
10 Piracy and File sharing
11 Electronic Government and Civics
12 Computer Revolution
13 History of Online Communities
14 Internet Technology
15 Online Business
> 2 sub-topics:

>>> A: NAME-Internet Tracking and Tracing
> AUTHOR- Brian Hoyle
> Page Numbers- p147-148
> Title of the Source:
Encyclopedia of Espionage, Intelligence and Security
> Detroit: Gale, 2004

>>> B: NAME- Internet Privacy
> AUTHOR- Jeffrey Wilson (editor)
> Page #s- p1033-1039
> Title of the Source:
Gale Encyclopedia of Everyday Law
> Detroit: Gale, 2006

1ST POST

Hi everyone! Looking forward to learning more and really solidifing my understanding of the Internet and how to search more effectively. Hope to see new perspectives from other students, and the feedback from our instructor as well as the 'live' real-time classroom interaction... Have a great quarter! Larry Bernal