SlideShare une entreprise Scribd logo
1  sur  14
Research on the Internet
American Intercontinental University
Greg Fowler
Effective Information Searches
• Effective searching is important because of the vast
amount of information available.
HOW DO WE SEARCH THE
INTERNET EFFECTIVELY?
BOOLEAN searches
Boolean searches save time…
BOOLEAN searches
Utilize operators to SAVE TIME!
OR
AND
NOT
-
+
“quotation marks”
Finding and Using Primary Sources
Primary sources include:
• Physical artifacts
• Recordings
• Original documents
• Peer-reviewed original findings
However…
“As critical thinkers, they [students] must learn that it
can be problematic to rely on a single source for
information.” – Morgan and Rasinski
The Influence of Web 2.0
Web 2.0 has opened a gateway to utilizing primary
sources…
Individuals can view (in real-time):
• Source photos
• Maps
• Documents
• Movie
• Audio files
Verifying Resources
We look for the most reliable resources in order to get
the most accurate information, so…
WHY DO WE NEED TO VERIFY THE SOURCE?
In accurate information = problems
Deciding on Validity: Areas to Consider
1. Authority – who is dishing out the info?
2.Independent corroboration – what do others say
about the information source?
Deciding on Validity: Areas to Consider
3. Plausibility and support – does the information
mentioned seem factual?
• Unrealistic expectations or findings
4. Presentation – is the source professional
looking/sounding?
• Spelling/grammar
Keeping Track of Fluid Info Sources
Once a credible information source is found, it must be
bookmarked and monitored…
RSS (real simple syndication) Feeds
RSS allows users to continually receive the information
they desire whenever it is published.
RSS feeds allow users to organize and filter their
information.
The Bottom Line…
Information can be heavily filtered to suit a user’s
needs.
Time can be saved if these filtering techniques are
learned and utilized.
The information found needs to be credible, and there
are methods to use to ensure this.
Current technologies allow for the immediate retrieval
of desired information.
References
Anderson, M. (2010). Expanding the Power of Primary
Sources With Web 2.0. Multimedia & Internet@Schools,
17(4), 36-38. Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.a
spx?direct=true&db=ehh&AN=52707160&site=ehost-
live
Clinton, D. (2005). The Art of Effective Web Searching. T H
E Journal, 33(2), 32. Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.a
spx?direct=true&db=ehh&AN=18404154&site=ehost-
live
References (continued)
Fallis, D. (2004). On Verifying the Accuracy of Information:
Philosophical Perspectives. Library Trends, 52(3), 463-487.
Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t
rue&db=ehh&AN=12885268&site=ehost-live
Morgan, D. N., & Rasinski, T. V. (2012). The Power and Potential of
Primary Sources. Reading Teacher, 65(8), 584-594.
doi:10.1002/TRTR.01086
Stephens, W. (2012). AMPLIFY YOUR PROFESSIONAL
KNOWLEDGE THROUGH RSS. Knowledge Quest, 41(2), 26-28.
Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t
rue&db=ehh&AN=83341511&site=ehost-live

Contenu connexe

Tendances

Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012Brian Rowe
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...printwork4849
 
Research Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectResearch Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectAmy Ferguson
 
Information literacy studies for webinars
Information literacy studies for webinarsInformation literacy studies for webinars
Information literacy studies for webinarsKalle Covert
 
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...drs. Julia Romijn-Wixley MA
 
Information Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and TrendsInformation Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and TrendsDebashisnaskar
 
Publish or Perish Workshop Presentation
Publish or Perish Workshop PresentationPublish or Perish Workshop Presentation
Publish or Perish Workshop PresentationMaurice Dawson
 
Plagiarisme di edukasi
Plagiarisme di edukasiPlagiarisme di edukasi
Plagiarisme di edukasiRakaRinanda
 
Year 7 information and communications technologies
Year 7 information and communications technologiesYear 7 information and communications technologies
Year 7 information and communications technologiesmrscooper
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetNicholas Davis
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slaveryterracelibrary
 
Zhang d lis551_assignment3
Zhang d lis551_assignment3Zhang d lis551_assignment3
Zhang d lis551_assignment3Dibiboi
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slaverylibguide
 
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Agnis Stibe
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 

Tendances (20)

Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Access and licencing of data
Access and licencing of dataAccess and licencing of data
Access and licencing of data
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
Research Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectResearch Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural Project
 
Information literacy studies for webinars
Information literacy studies for webinarsInformation literacy studies for webinars
Information literacy studies for webinars
 
Anovelidea
AnovelideaAnovelidea
Anovelidea
 
Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...
Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...
Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...
 
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
 
Information Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and TrendsInformation Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and Trends
 
Publish or Perish Workshop Presentation
Publish or Perish Workshop PresentationPublish or Perish Workshop Presentation
Publish or Perish Workshop Presentation
 
Plagiarisme di edukasi
Plagiarisme di edukasiPlagiarisme di edukasi
Plagiarisme di edukasi
 
Research, internet and libraries
Research, internet and librariesResearch, internet and libraries
Research, internet and libraries
 
Year 7 information and communications technologies
Year 7 information and communications technologiesYear 7 information and communications technologies
Year 7 information and communications technologies
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime target
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slavery
 
Zhang d lis551_assignment3
Zhang d lis551_assignment3Zhang d lis551_assignment3
Zhang d lis551_assignment3
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slavery
 
171209 lingnan
171209 lingnan171209 lingnan
171209 lingnan
 
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 

Similaire à Research on the internet

Unpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research ProcessUnpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research Processekhoogestraat
 
Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1Traciwm
 
Usability Report - Discovery Tools
Usability Report - Discovery ToolsUsability Report - Discovery Tools
Usability Report - Discovery ToolsNikki Kerber
 
Introduction to information literacy part 1
Introduction to information literacy part 1Introduction to information literacy part 1
Introduction to information literacy part 1mhayes2006
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxRomaSmart1
 
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...Robert H. McDonald
 
English 2.8 presentation
English 2.8 presentationEnglish 2.8 presentation
English 2.8 presentationDioLibrary
 
Research Strategies
Research StrategiesResearch Strategies
Research StrategiesEliot Boden
 
HIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and RemedyHIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and RemedyPRELIDA Project
 
Profile Locally Network Globally
Profile Locally Network GloballyProfile Locally Network Globally
Profile Locally Network Globallyericmeeks
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research RequirementsICPSR
 
Digital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'OroDigital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'OroMichael Mitchell
 
FORCE11: Creating a data and tools ecosystem
FORCE11:  Creating a data and tools ecosystemFORCE11:  Creating a data and tools ecosystem
FORCE11: Creating a data and tools ecosystemMaryann Martone
 
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationFSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationLorri Mon
 
OER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at HandOER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at HandIshan Abeywardena, Ph.D.
 

Similaire à Research on the internet (20)

Unpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research ProcessUnpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research Process
 
Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1
 
Usability Report - Discovery Tools
Usability Report - Discovery ToolsUsability Report - Discovery Tools
Usability Report - Discovery Tools
 
Introduction to information literacy part 1
Introduction to information literacy part 1Introduction to information literacy part 1
Introduction to information literacy part 1
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptx
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptx
 
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
 
English 2.8 presentation
English 2.8 presentationEnglish 2.8 presentation
English 2.8 presentation
 
howtoresearch colai
howtoresearch colaihowtoresearch colai
howtoresearch colai
 
Research Strategies
Research StrategiesResearch Strategies
Research Strategies
 
ir.pptx
ir.pptxir.pptx
ir.pptx
 
HIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and RemedyHIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and Remedy
 
Profile Locally Network Globally
Profile Locally Network GloballyProfile Locally Network Globally
Profile Locally Network Globally
 
Mam assign
Mam assignMam assign
Mam assign
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research Requirements
 
Digital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'OroDigital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'Oro
 
FORCE11: Creating a data and tools ecosystem
FORCE11:  Creating a data and tools ecosystemFORCE11:  Creating a data and tools ecosystem
FORCE11: Creating a data and tools ecosystem
 
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationFSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
 
OER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at HandOER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at Hand
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Research on the internet

  • 1. Research on the Internet American Intercontinental University Greg Fowler
  • 2. Effective Information Searches • Effective searching is important because of the vast amount of information available. HOW DO WE SEARCH THE INTERNET EFFECTIVELY?
  • 4. BOOLEAN searches Utilize operators to SAVE TIME! OR AND NOT - + “quotation marks”
  • 5. Finding and Using Primary Sources Primary sources include: • Physical artifacts • Recordings • Original documents • Peer-reviewed original findings However… “As critical thinkers, they [students] must learn that it can be problematic to rely on a single source for information.” – Morgan and Rasinski
  • 6. The Influence of Web 2.0 Web 2.0 has opened a gateway to utilizing primary sources… Individuals can view (in real-time): • Source photos • Maps • Documents • Movie • Audio files
  • 7. Verifying Resources We look for the most reliable resources in order to get the most accurate information, so… WHY DO WE NEED TO VERIFY THE SOURCE? In accurate information = problems
  • 8. Deciding on Validity: Areas to Consider 1. Authority – who is dishing out the info? 2.Independent corroboration – what do others say about the information source?
  • 9. Deciding on Validity: Areas to Consider 3. Plausibility and support – does the information mentioned seem factual? • Unrealistic expectations or findings 4. Presentation – is the source professional looking/sounding? • Spelling/grammar
  • 10. Keeping Track of Fluid Info Sources Once a credible information source is found, it must be bookmarked and monitored…
  • 11. RSS (real simple syndication) Feeds RSS allows users to continually receive the information they desire whenever it is published. RSS feeds allow users to organize and filter their information.
  • 12. The Bottom Line… Information can be heavily filtered to suit a user’s needs. Time can be saved if these filtering techniques are learned and utilized. The information found needs to be credible, and there are methods to use to ensure this. Current technologies allow for the immediate retrieval of desired information.
  • 13. References Anderson, M. (2010). Expanding the Power of Primary Sources With Web 2.0. Multimedia & Internet@Schools, 17(4), 36-38. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.a spx?direct=true&db=ehh&AN=52707160&site=ehost- live Clinton, D. (2005). The Art of Effective Web Searching. T H E Journal, 33(2), 32. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.a spx?direct=true&db=ehh&AN=18404154&site=ehost- live
  • 14. References (continued) Fallis, D. (2004). On Verifying the Accuracy of Information: Philosophical Perspectives. Library Trends, 52(3), 463-487. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t rue&db=ehh&AN=12885268&site=ehost-live Morgan, D. N., & Rasinski, T. V. (2012). The Power and Potential of Primary Sources. Reading Teacher, 65(8), 584-594. doi:10.1002/TRTR.01086 Stephens, W. (2012). AMPLIFY YOUR PROFESSIONAL KNOWLEDGE THROUGH RSS. Knowledge Quest, 41(2), 26-28. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t rue&db=ehh&AN=83341511&site=ehost-live

Notes de l'éditeur

  1. Effective searching is important because the quantity of information is greater than it has ever been and time is usually of the essence. Information search techniques are not limited to the internet (good information can still be found in books, magazines, and other materials that are not found online), but internet searches will be the focus in this presentation since the world of information and technology is growing at an exponential rate.Clinton (2005) states, “That simple little box at the top of every search engine has opened up a boundless new world for millions of people” (p. 1). The key word here being boundless. With boundless information that floods the screen after a user types a keyword into the little box at the top of the screen comes the need for more efficient ways of sorting the information.
  2. Boolean searches, and other effective information-specific searches, will save a user a vast amount of time. They will not have to scour through so much garbage that can be pulled up during searches. With advertising and money being a driving force behind the internet at times, the ability to get rid of the junk mail quicker and find the check in the mail is needed.
  3. Boolean searches utilize operators such as: OR, NOT, AND, +, -, and quotation marks. OR allows users to search for two different terms. The sites brought up will display either of the terms. NOT allows users to exclude certain terms from the search. AND allows users to bring up sites that display all terms connected by the AND operator. For example, cats AND dogs would bring up sites that include both terms whereas using the OR operator would bring up sites that have information on either cats OR dogs. The + and – operators simply allow users to add or subtract certain terms from the sites the query generates. For example, while searching “information literacy,” a user may add children to the search by entering +children. If they are looking for information literacy in adults, the user may want to enter +adults and –children. This would look for pages with the term adults and exclude pages with the term children.
  4. Using primary sources allows students the benefit of experiencing, or reading about, first-hand accounts or information. Primary sources include: physical artifacts, recordings, original documents, peer-reviewed research papers reporting experimental findings, etc. Secondary sources typically cite or comment on primary sources. However, in today’s technological world, primary sources can be found easily on the internet. “When exposed to multiple sources, students must learn through observation and analysis how to integrate this information…” (Morgan & Rasinski, 2012, p. 587). It is also crucial for individuals to understand that “As critical thinkers, they [students] must learn that it can be problematic to rely on a single source for information” (Morgan & Rasinski, 2012, p. 587).
  5. Primary sources are more reliable than most. Therefore, students should continually be pushed to use them. Web 2.0 has opened up a huge gateway to viewing and sharing primary sources. Anderson (2010) mentions a Web 2.0 tool called VoiceThread. This tool, along with countless other Web 2.0 tools, “…have the potential to foster engaged discussion about a primary source photo, map, broadside, document, movie, or audio file” (Anderson, 2010, p. 36).
  6. Why do we try and find information sources? And why is it important that we verify them? Fallis (2004) offers that following about finding quality information, “The main reason that we are interested in finding information sources that are authoritative, objective, and current is that we think that they are more likely to be accurate” (p. 1). So after the quality information is found, we must then verify it. Inaccurate information can cause too many problems. For example, a consumer of health information found on the internet may inadvertently harm themselves by taking a certain medication they read was supposed to help their condition.
  7. Based on the work of David Hume (1977) and Alvin Goldman (1999 and 2001), Fallis (2004) suggests four areas to consider when deciding on the validity of a source:Authority. Who is providing the original piece of information? Is a lawyer giving medical advice? Also, has this source of information been a credible one in the past?Independent corroboration. Do other people believe the origination of the information to be a credible one? What do others say about the source? Have other professional research investigations used this source?
  8. Plausibility and support. How plausible is the information given? If a diet pill claims to make you lose 8 pounds a day, is this plausible? If an overweight person is trying to sell you the diet pill and claiming that it has done wonders for them, is this genuine support?Presentation. If wondering if a source found on the web is accurate, then take a look at the presentation. Are there spelling or grammatical errors? Is it .com, .gov, .edu, or .net? Also, are the references for the information displayed credible? If the author is citing erroneous sources, then why believe the author/source?
  9. Once a credible information source has been determined, then bookmarking and monitoring the source is crucial. With today’s technology, fluid internet sources can be easily monitored. Most computer operating systems offer bookmarking systems which allow the user to copy the URL of a website so they may reference it at a later time. However, RSS feeds offer users a much more advanced version of bookmarking.
  10. RSS (real simple syndication) feeds offer users the ability of keeping track of changing news without having to search for it. Once a user finds a credible site with the information they need, they simply prescribe to that sites RSS feed (if it has one). Whenever new information is uploaded to the site, the user is notified and can access it. The user can narrow the information the RSS feed takes from the site by using tags. “For people overwhelmed by the multiple sites you must monitor for both personal and professional news, a couple of hours spent subscribing to and organizing RSS feeds might end up being an investment in 21st-century sanity” (Stephens, 2012, p. 28).
  11. ReferencesAnderson, M. (2010). Expanding the Power of Primary Sources With Web 2.0. Multimedia & Internet@Schools, 17(4), 36-38. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=52707160&site=ehost-liveClinton, D. (2005). The Art of Effective Web Searching. T H E Journal, 33(2), 32. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=18404154&site=ehost-live
  12. ReferencesFallis, D. (2004). On Verifying the Accuracy of Information: Philosophical Perspectives. Library Trends, 52(3), 463-487. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=12885268&site=ehost-liveMorgan, D. N., & Rasinski, T. V. (2012). The Power and Potential of Primary Sources. Reading Teacher, 65(8), 584-594. doi:10.1002/TRTR.01086Stephens, W. (2012). AMPLIFY YOUR PROFESSIONAL KNOWLEDGE THROUGH RSS. Knowledge Quest, 41(2), 26-28. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=83341511&site=ehost-live