You are on page 1of 5

Cynthia Pesienji

Assignment 1: Information literacy

CSIT 101
Professor Boze
01/08/2015

1. Login to the CCBC Library website. Click in the Search for articles,
books and more at once dialog box. Search for two scholarly journal
articles in the library databases on a topic listed below. Be sure to
check the box on the left of the search results to only show scholarly
journal articles. Answer the following questions: (8 points)
Article must discuss one or more of the following topics;
Mobile technology
Ethics
Privacy
Security
Emerging technology
List the keywords you used to find the articles.
-Privacy issues with technology
Identify the database you used.
-The database I used was Library, information Science and Technology
Abstracts
Why did you choose this database?
-The reason I chose this database is because even though my search was
about privacy I wanted more of a focus in technology and information
science. My reasoning was that this database would provide me with more
accurate results.
Paste in a screen print of the search results to show you filtered to only
review scholarly articles. Use the windows snipping tool, CTRL+Prtscrn,
ALT+Prtscrn or FN+Prtscrn then paste it into this document.

Cynthia Pesienji
Assignment 1: Information literacy

2. Search the Internet to find a current event article on the same topic.
(5 points)
The article must be current (no more than 30 days old) and from a
reputable source
Some recommended sites are zdnet.com, techcrunch.com, technology
sections of CNN, BBC, NY Times, and Economist.
Write a paragraph summarizing the article in 3-4 sentences.
-Website used:zdnet.com
-Title: Google Hangouts: Too Smart For Privacy
-Summary: The article discusses about how the privacy that users may think
they have on Google hangouts, may not exist. The artificial intelligence
associated with Google hangouts eavesdrops on your conversations in order
to offer the user smart suggestions. Users should be informed of the
information that Google hangout gathers and who has access to that
information so they are aware of what is going on when they take part in such
activities.

3. Find one additional Internet article on the same topic. (5 points)


List the keywords you used to do the search.
-Keywords: Articles on privacy issues
Run the same search on two different search engines.
Identify the search engines you used.
-Search engines used: Google.com and Bing.com

Cynthia Pesienji
Assignment 1: Information literacy

Create a table to compare the results from the two search engines was
one search engine better than the other, why, how. How many search results
did you receive? Etc.
Google.com
Similarities
Bing.com
456,000 Results
On the first page, most
58,600,000 Results
of the articles are the
same
Google was better than
bing because it gave me
more articles realted to
the topic that I was
searching

4. TRAAP your sources. (5 points)


Evaluate the Internet article you found in step 3 by answering the following
questions:
1. Time: August 1st, 2013
2. Relevance The article does relate to my topic of privacy.
3. Authority The author is Miles Graham
4. Accurate is the information trustworthy? Is it supported by evidence? Has it
been tested for accuracy? The information that the autor provides is trustworthy
because in the article he provides many reliable sources where he received his
information.
5. Purpose why was it written, to inform, sell, persuade? Is there a bias or is the
material objective? His purpose was to inform readers of how little privacy that we
actually possess.
5. Compare the Internet and Journal articles. (5 points)
Write a paragraph comparing the Internet article and one journal article.
The journal article was overall more reliable and accessible than the internet
article. When searching for the journal article, I was able to choose a database and
narrow the results down to only those that have been peer reviewed; leaving me
with only 119 results. Whereas when searching for the internet article, I ended up
with millions of results which is not helpful because most of the results that you end
up with did not relate to the topic in which I was working on. I absolutely put more
time into finding the internet article not only because of the mass amount of results
but also due to the fact that I had to filter out the articles that I felt was reliable
enough. Another difference when it came to the two articles was the authors. While
the internet article was able to tell me the author, the authors sources and some of
his other works, the journal article provide me with the author, plenty of other
articles developed by the author, author affiliations, a summary of the passage and
also the sources that the author used.
6. Cite all four sources in APA or MLA format. (8 points)
- I will be using MLA format

Cynthia Pesienji
Assignment 1: Information literacy

Works Cited
Crawford, Walt. "Technology, Privacy, Confidentiality, And Security." Library Technology
Reports 41.2 (2005): 24-30. Library, Information Science & Technology Abstracts. Web.
11 Jan. 2015.
Graham, Miles. "Americans Sharply Split on Privacy Issues | TIME.com." US Americans
Sharply Split on Privacy Issues Comments. Time, 1 Aug. 2013. Web. 11 Jan. 2015.
Jayson, Sharon. "Social Media Research Raises Privacy and Ethics Issues." USA Today. Gannett,
12 Mar. 2014. Web. 08 Jan. 2015.

Cynthia Pesienji
Assignment 1: Information literacy

Wilson, Steve. "Google Hangouts: Too Smart for Privacy? | ZDNet." ZDNet. N.p., 17 Dec. 2014.
Web. 11 Jan. 2015.

You might also like