Skip to main content

Home/ Groups/ IMT122 OUA Group
Joanne S

How to get better marks in a university assignment. What this marker wants you to know ... - 1 views

    • Joanne S
       
      What you need to do to get better marks. What markers want you to know. Use APA6. Markers already know you are clever and capable. Markers want to give you marks but you need to help them. How? 1. Answer the Question. 2. Know the Marking criteria. 3. Do what is says 4. Use conventions of Academic Writing 3.1 Demonstrate,  Show Evidence Of We give you marks for what you show. 3.2 Growth of subject knoweledge. Critical thinking. Insight into material covered.
    • Joanne S
       
      Show basic knowledge of terms and readings. Spell out abbreviations. Correct scholarly writing
    • Joanne S
       
      Critical thinking about the subject and readings. Have I shown the "So what?"  Evaluative and showing both sides of the story.
    • Joanne S
       
      4. Show clearly your own ideas. In Academic writing, if you do not clearly indicate where an idea comes from, the reader presumes you are claiming it as original thought. Your critical engagement with the ideas. It's up to you to demonstrate the seperation of ideas, what's yours and what is the readings. To get more marks: Read the question Answer it. All of it. Know the marking criteria Remember markers want to give you marks but you have to demonstrate what you know Be specific Use academic writing Clarify what is you idea and what is someone else Show critical and evaluative thinking
  •  
    Markers already know you are clever and capable.
Joanne S

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
Joanne S

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

Office of the Auditor General for Western Australia. (2011). Information Systems Audit ... - 0 views

  •  
    Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Summary. Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/insert2011_04.pdf
Joanne S

Full Report - Information Systems Audit Report: Full Report (No. 4). Perth, Western Au... - 0 views

  •  
    ( Full report at Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Full Report (No. 4). Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/report2011_04.pdf )
Joanne S

xkcd: Password Strength - 0 views

  •  
    Cartoon/Picture
Joanne S

Page 2. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Several threats to the Web’s universality have arisen recently. Cable television companies that sell Internet connectivity are considering whether to limit their Internet users to downloading only the company’s mix of entertainment.
  • Social-networking sites present a different kind of problem. Facebook, LinkedIn, Friendster and others typically provide value by capturing information as you enter it
  • The sites assemble these bits of data into brilliant databases and reuse the information to provide value-added service—but only within their sites.
  • ...1 more annotation...
  • The basic Web technologies that individuals and companies need to develop powerful services must be available for free, with no royalties.
Joanne S

Page 3. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Web Consortium’s royalty-free patent policy says that the companies, universities and individuals who contribute to the development of a standard must agree they will not charge royalties to anyone who may use the standard.
  • Apple’s iTunes system, for example, identifies songs and videos using URIs that are open. But instead of “http:” the addresses begin with “itunes:,” which is proprietary. You can access an “itunes:”
  • martphone “apps” rather than Web apps is disturbing, because that material is off the Web.
Joanne S

Page 4. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • The Web is an application that runs on the Internet
  • Although internet and web designs are separate, a Web user is also an Internet user and therefore relies on an Internet that is free from interference.
  • Technology for interference has become more powerful
Joanne S

Page 5. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Debate has risen again in the past year about whether government legislation is needed to protect net neutrality.
  • Accessing the information within an Internet packet is equivalent to wiretapping a phone or opening postal mail.
  • Totalitarian governments aren’t the only ones violating the network rights of their citizens.
  • ...1 more annotation...
  • “No person or organization shall be deprived of the ability to connect to others without due process of law and the presumption of innocence.”
Joanne S

Page 6. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Linking to the Future As long as the web’s basic principles are upheld, its ongoing evolution is not in the hands of any one person or organization—neither mine nor anyone else’s. If we can preserve the principles, the Web promises some fantastic future capabilities.
  • Locked within all these data is knowledge about how to cure diseases, foster business value and govern our world more effectively.
  • We should examine legal, cultural and technical options that will preserve privacy without stifling beneficial data-sharing capabilities.
  • ...1 more annotation...
  • The goal of the Web is to serve humanity. We build it now so that those who come to it later will be able to create things that we cannot ourselves imagine.
Joanne S

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
Joanne S

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

Go To Hellman: Ten Evil Uses for URL Shortening Services - 0 views

  • Today, we cover URL shortening services:  Bit.ly, TinyURL, Ow.ly and friends.
  • Here are ten link shortening menaces for you to nibble on.
  • cross-site scripting vulnerability
  • ...7 more annotations...
  • Phishing attacks
  • SQL injection
  • Spam blocking
  • avoid the porn filter
  • Shortened links are free, so you can use a new one for every recipient.
  • PURL. If one of your machines gets taken out, you can edit the PURL to keep your link working, and shorten it for good measure.
  • As I've described here, there are lots of ways to abuse a link redirection service
Joanne S

Boolean Searching on the Internet - 0 views

  • Boolean logic consists of three logical operators: OR AND NOT
  • Combined AND and OR logic Question: I want information about the behavior of cats. Search: behavior AND (cats OR felines)
Joanne S

Web Page Evaluation Checklist - 0 views

  •  
    Links to downloadable RTF (Word) Workshop task for Topic 4.
  •  
    Links to downloadable RTF (Word) Workshop task for Topic 4.
Joanne S

webeval-QuestionsToAsk.pdf (application/pdf Object) - 0 views

  •  
    Workshop for Topic 4.
Joanne S

RYT Hospital-Dwayne Medical Center. All the miracles of modern medicine.™ - 0 views

  •  
    Out of the 7 sites. - two are genuine, the rest are fake. Which is which? Why?
  •  
    Workshop for Topic 04
1 - 20 Next › Last »
Showing 20 items per page