Skip to main content

Home/ IMT122 OUA Group/ Group items matching ""Week 04"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

The rise of e-reading | Pew Internet Libraries - 0 views

  •  
    Rainie, L., Zickuhr, K., Purcell, K., Madden, M., & Brenner, J. (2012). The rise of e-reading. Washington, DC: Pew Research Center's Internet & American Life Project. Retrieved from http://libraries.pewinternet.org/2012/04/04/the-rise-of-e-reading/ (Read just the summary at the start or browse the whole report
2More

Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views

    • Joanne S
       
      Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
1More

The Technium: What Books Will Become - 0 views

  •  
    Kelly, K. (2011). What Books Will Become. The Technium. Retrieved May 9, 2011, from http://www.kk.org/thetechnium/archives/2011/04/what_books_will.php
1More

blyberg.net » Blog Archive » The Darien Statements on the Library and Librarians - 0 views

  •  
    Blyberg, J., Greenhill, K., & Trainor, C. (2009, April 3). The Darien Statements on the Library and Librarians. blyberg.net. Retrieved October 21, 2010, from http://www.blyberg.net/2009/04/03/the-darien-statements-on-the-library-and-librarians/
2More

RYT Hospital-Dwayne Medical Center. All the miracles of modern medicine.™ - 0 views

  •  
    Out of the 7 sites. - two are genuine, the rest are fake. Which is which? Why?
  •  
    Workshop for Topic 04
2More

Boolean Searching on the Internet - 0 views

  • Boolean logic consists of three logical operators: OR AND NOT
  • Combined AND and OR logic Question: I want information about the behavior of cats. Search: behavior AND (cats OR felines)
10More

Go To Hellman: Ten Evil Uses for URL Shortening Services - 0 views

  • Today, we cover URL shortening services:  Bit.ly, TinyURL, Ow.ly and friends.
  • Here are ten link shortening menaces for you to nibble on.
  • cross-site scripting vulnerability
  • ...7 more annotations...
  • Phishing attacks
  • SQL injection
  • Spam blocking
  • avoid the porn filter
  • Shortened links are free, so you can use a new one for every recipient.
  • PURL. If one of your machines gets taken out, you can edit the PURL to keep your link working, and shorten it for good measure.
  • As I've described here, there are lots of ways to abuse a link redirection service
12More

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
2More

SEO: The Beginners guide to SEO - 0 views

  • Search queries, the words that users type into the search box, carry extraordinary value.
  • In addition to making content available to search engines, SEO also helps boost rankings so that content will be placed where searchers will more readily find it.
3More

Search Optimization and Its Dirty Little Secrets - NYTimes.com - 0 views

  • black-hat services are not illegal, but trafficking in them risks the wrath of Google. The company draws a pretty thick line between techniques it considers deceptive and “white hat” approaches, which are offered by hundreds of consulting firms and are legitimate ways to increase a site’s visibility.
  • In deriving organic results, Google’s algorithm takes into account dozens of criteria,
  • one crucial factor in detail: links from one site to another.
1More

Taylor & Francis Online :: Optimal Results: What Libraries Need to Know About Google an... - 0 views

  •  
    Cahill, K., & Chalut, R. (2009). Optimal Results: What Libraries Need to Know About Google and Search Engine Optimization. The Reference Librarian, 50(3), 234-247. doi:10.1080/02763870902961969 ( You will need to be logged into Curtin Library to access this).
15More

The Deep Web - 0 views

  • defined as the content on the Web not accessible through a search on general search engines.
  • sometimes also referred to as the hidden or invisible web.
  • the part of the Web that is not static, and is served dynamically "on the fly," is far larger than the static documents
  • ...11 more annotations...
  • When we refer to the deep Web, we are usually talking about the following:
  • The content of databases.
  • Non-text files such as multimedia, images, software, and documents in formats such as Portable Document Format (PDF) and Microsoft Word.
  • Content available on sites protected by passwords or other restrictions.
  • Special content not presented as Web pages, such as full text articles and books
  • Dynamically-changing, updated content,
  • let's consider adding new content to our list of deep Web sources. For example:
  • Blog postings Comments Discussions and other communication activities on social networking sites, for example Facebook and Twitter Bookmarks and citations stored on social bookmarking sites
  • Tips for dealing with deep Web content
  • Vertical search
  • Use a general search engine to locate a vertical search engine.
  •  
    The Web not accessible through a search on general search engines..
11More

How to solve impossible problems: Daniel Russell's awesome Google search techniques - 0 views

  • Most of what you know about Boolean is wrong.
  • Think about how somebody else would write about the topic.
  • Use language tools.
  • ...8 more annotations...
  • Use quotes to search for phrases.
  • Force Google to include search terms.
  • intext:”San Antonio” intext:Alamo
  • It forces Google to show results with the phrase “San Antonio” and the word Alamo. You won’t get results that are missing either search term.
  • Minus does not equal plus.
  • “Control F” is your friend
  • Limit the time frame.
  • Use this keyboard shortcut to find a word or phrase on any web page. I
1 - 20 of 26 Next ›
Showing 20 items per page