Thursday, April 29, 2010

*Summary of Unit 4*

Unit 4 was based on using diffrent reliable and credited resources to find books, and information on keywords and subjects being researched. Out of the four sources used I found that the summit catalog worked best for me because of the 38 academic libraries. I did not like using google books because the format, and the information was hard to get to.

*2.d: Google Books *

•Search Term used
-Internet Surveillance

•Citation information for the book: (author, title, city of publication, publisher, publication date)
-author:Collen Mccue-title:Data Mining and Predictive Analysis:Intelligence gathering and crime analysis-city of publication:Burlington, MA-publisher:Butterworth Heinemann-publication date:2006

•What clues does Google Books provide that lead you to believe this book is trustworthy?
--author:Collen Mccue-title:Data Mining and Predictive Analysis:Intelligence gathering and crime analysis-city of publication:Burlington, MA-publisher:Butterworth Heinemann-publication date:2006

*2.c. Books 24x7 – IT Pro Collection of E-books summary*

IT Pro was a very good resource for finding reliable and credited information. I like the page set up, format, and how the additional fields found in the advance search section help you search deeper into the subject and keywords being research it is definetly a source I will be using in the future.

*2.b. The Summit Catalog*

•Search Term used
-Internet Surveillance

•Citation information for one book: (author, title, city of publication, publisher, publication date)
-Intrusion detection : an introduction to Internet surveillance, correlation, traps, trace back, and response
Author: Edward G Amoroso
Publisher: Sparta, N.J. : Intrusion.Net Books, 1999.

•Subject Headings (the field is called “Related Subjects” in Summit)
-Computer networks -- Security measures.
Internet -- Security measures.
Computer security.

•Location and Call Number for the Book.
-Seattle Pacific University General Collection call number TK5105.59 .A465 1999

•What clues in the book record lead you to believe that this book is credible, or trustworthy?
-Author: Edward G Amoroso
Publisher: Sparta, N.J. : Intrusion.Net Books, 1999.

•How did this search differ from the search in the Cannell Library Book Catalog?
-This search differed by giving me a broader search through not just one library, but 38 academic libraries.

*Unit 4:Research Journal Worksheet, Part 2: Exploring Databases and Finding Books 2.a. Cannell Library Book Catalog*

•Search Term used
-Internet Surveillance

•Citation information for one book: (author, title, city of publication, publisher, publication date)
-Title Modernity and technology [electronic resource] / edited by Thomas J. Misa, Philip Brey, and Andrew Feenberg.
Publication Info Cambridge, Mass. : MIT Press, c2003.

•Subject Headings (taken from the Subject Field)
-Technology -- Social aspects.

•Is this a Circulating Book or an E-Book?
-E-Book

•Location and Call Number for the Book
-Online Resource

•What clues in the book record lead you to believe that this book is credible, or trustworthy?
-Title Modernity and technology [electronic resource] / edited by Thomas J. Misa, Philip Brey, and Andrew Feenberg.
Publication Info Cambridge, Mass. : MIT Press, c2003.

Wednesday, April 21, 2010

Unit 3 Activity: Matching Sources to Needs

Below each question are the source that are best suited for the question.

1.Why is internet surveillance needed?
GVRL is the best source for this question because that's were I found this particular topic.

2.What is Carnivore software?
I found this official web site to be the best source for this question because it was easy to find has all the information you need to know with out hassle. http://computer.howstuffworks.com/carnivore.htm

3.What does ISP stand for?
Webster Online Dictionary is the best source for this question because it cover everything you need to know about ISP, and was easy to find with no hassle.

Friday, April 16, 2010

Summary of Unit 2 Research Journal Worksheet 1

In this unit I learned how to blog using Blogger use GVRL and IRIS tutorials though Clark College Library, along with Wikipedia which are all great learning and research tools. The subject I researched was Internet, and Internet Surveilance using the GVRL, and Wikipedia which are very reliable sources for information. I took many notes and learned various things on these subjects and am glad to say I now know how to use and of these resources.

3 question on Internet Surveillance

1.Why is internet surveillance needed?
2.What is Carnivore software?
3.What does ISP stand for?

Wikipedia search on Internet Surviellance

Notes

*Total Information Awarness
*Magic Lantern
*CIPAV
*NSA call data base
*Tempest
*Ghost Net
*Cyber spying

Unit 2 Research Journal Worksheet 1

Internet

Tool:Gale Virtual Reference Library
Topic:Internet Surveillance
Key Words:

*monitoring *data *software *scan *encryption*electronic addresses *hardware*recorded *virus *downloading *TIA *Echelon *Carnivore *programs *ISP

Source Citation GILMAN, LARRY. "Internet Surveillance." Encyclopedia of Espionage, Intelligence and Security. Ed. K. Lee Lerner and Brenda Wilmoth Lerner. Vol. 2. Detroit: Gale, 2004. 145-147. Gale Virtual Reference Library. Web. 12 Apr. 2010.

2nd:Source Citation Kalyanaraman, Sriram. "Internet Pornography, Effects of." Encyclopedia of Children, Adolescents, and the Media. Vol. 1. Thousand Oaks, CA: Sage Reference, 2007. 427-429. Gale Virtual Reference Library. Web. 12 Apr. 2010.

Monday, April 12, 2010

My Blog

Hi my name is Toby Gleghorn