...Analyzing Internet Sources What I learned was how to choose which web site were better to use for educational purposes. I learned some important facts about using the internet to find resources and to know if the web site is a credible source. When looking at the web site it is a good idea to look at when the site was last updated, if it is a .org or .edu they tend to be more reliable. When looking to see if the site was good to use for the global warming project there were some good sites to use and then there were also some bad ones. The good ones were that were most updated and the ones were they were not asking for money for you to buy the information from them. These are just some of the things I learned for these activities. The things I did not learn for these this activity was that if there was a sure way to tell if the web site was credible. I know some ways that will help me tell but how do I know if the last update is the correct date or by the authors name. What if the author is lying about their name and they just made up everything on the site. I think I have a pretty good understanding of when a site is okay to use but I just wish there was a full proof method to it in finding out. I do not want to accidently use a site that was false information where they public can put anything they want to on it for an academic...
Words: 276 - Pages: 2
...Arturo G Pizarro GEN105 Week 3 Analyzing Internet Sources 1) What are the three or more best practices you learned about using the Internet for Academic Purposes? How do you think you might use them? Using the internet for academic research is different to using it for leisure and pleasure. Making best use of search engines help you identify information on a particular subject. One of the common search engines is Google, which, personally, helps me a lot when I need to find something on the internet. Also, I think using Gateways can help you, because they are good sources of quality-checked resources, which have been selected carefully from many websites sorted into specific subjects. Finally, using the information in a well manner, because when you use sources of information, books, articles, and internet sources; all that needs to be acknowledge by citing the work. 2) How can you determine if the information on a website is reputable and worthwhile for a research paper? Anyone can put anything on the internet. Whenever you need to verify for the information that you are trying to investigate, many things need to be checked, like if the information is out of date, or if it is distorted, or simply untrue. So when you find what you are looking for, it is always good to consider who wrote it, or the credentials, or who is this written for. A key of confirming that the information is accurate, up-to-date, reliable, and appropriate is to check this information...
Words: 260 - Pages: 2
...Week2: General Internet Skills I learned some important information literacy basics from listening to the gentlemen talk about an overview of the Library, Internet and some wrap-up information. I also learned about some critical analyzing internet sources. I learned that the Library was designed for research papers, speeches, projects, and essays. Information that you find in the Library is usually credible information. That is different from using the internet because when you use the internet to find resources, you take a big risk using that information as credible. You should also look on the internet, when you find a source that you were researching on, to see if you can find factual information within the other sources that you are looking at. Also, when you are using the internet for research purposes, there are no trained specialists available to help you if you should need any help. When you are using the internet you should use these strategies for your search results: 1. Always keep in mind what you need to find or locate 2. Examine the URL 3. Examine the synopsis or short description of the site 4. Bookmark sites that look useful to you 5. Examine the related searches list You should have strong information literacy skills while using the internet. You should also check for accuracy and credibility of any research you have done. Music or pictures that you have downloaded for your own personal use or for school projects cannot be used unless you pay or cite the...
Words: 403 - Pages: 2
...GEN 105 Week 2 Analyzing Internet Sources I have learned that no matter what you do when you are working with internet sources; you need to make sure that they are credible sources. It is very easy to be mistaken with the sources that you are working with. To get caught up with what you are doing, and mistake a bad source for a credible source. I have also learned that you need to make sure you give credit where credit is due. Making sure that you cite your sources is very important. Your websites that you visit need to be good websites as well; they need to be able to give you information that will help you with your paper work. Websites like Wikipedia and YouTube are not necessarily websites that you would use for a college essay paper. You would need to go with the websites that have the .edu and .gov in the URL they are credible websites and have reliable information on their sites! You also need to make sure that you stay away from websites that have blogs and that are trying to sell things to you; these sites are not credible, and will not get you anywhere. The main thing is to make sure that you are double-checking that your sources are credible. Making sure that you cite everything that you do, and you should be fine! What I would have liked to learn in this exercise is mainly how to keep from using bad sources. I mean I know that the exercise cannot tell you everything, but it would have been helpful if it could have touched on it a little more and been a little...
Words: 355 - Pages: 2
...Individual Analyzing Internet Sources Week 2 What did you learn? I learned more than I expected from the Pearson student lab activities. In the first activity I knew most of the information presented, but in the second activity I learned quite a bit about researching a topic. I did not know that the URL .org is no longer limited to a non-profit or research organization; which makes it harder to use that as a reliable resource but it can still be useful. I learned it is important to look for non-bias opinions, information with publish dates are resourceful, research based, and the best domains to find good information on are .org, .gov, .mil, and .edu. Although just because the site has one of these domains it does not mean the resource is accurate or correct necessarily. What did you not learn? Well as I said in the previous paragraph in the first activity most of the information that was present I acquired before. The comparison between the library and the internet are basic knowledge to most people. The Library is based for research purposes, with trained staff to help you, but closes at certain times. The internet has multiple reasons for use, with no trained assistance, but it never closes. They each have great traits that can be used for study. I also knew it is not safe to purchase items online you must be careful when doing this. You need to do research and make sure the site is reliable. Some people think because a paper has a title and author that it is true but...
Words: 308 - Pages: 2
...Analyzing Internet Sources What did you learn? I learned that most of the websites that students overlook are actually the websites that are the most helpful. Many students use search websites such as: Google and yahoo to research information for their paper. Most websites that look like they have less information are mostly overlooked because of the glances. Student should examine all parts of the internet when using it as a research source. I’ve learned to always examine the URL, the synopsis, bookmark sites and research lists. Another great source of the internet is the local or school library. Many students including me overlook the library because it’s not convenient as the internet. The library takes up too much time versus the internet with all today’s new technology. I have overlooked researching at the library many times because the library takes up to much time and the internet requires less time. What did you not learn? I did not learn how to start a simple research using the internet or using textbooks from the library. I personally think using the internet as a research source is somewhat very difficult than actually going into the library. Most students don’t realize a bad site, the ones that ask you to register with them for more information. I also didn’t learn how to use the internet or the library as a research source without plagiarism even though I know. Many students think its okay to copy straight from the book or internet. Plagiarism is not taught...
Words: 303 - Pages: 2
...Developmental Psychology 2006, Vol. 42, No. 3, 391–394 Copyright 2006 by the American Psychological Association 0012-1649/06/$12.00 DOI: 10.1037/0012-1649.42.3.391 Children, Adolescents, and the Internet: A New Field of Inquiry in Developmental Psychology Patricia Greenfield Zheng Yan University of California, Los Angeles University at Albany, State University of New York With this special section on children, adolescents, and the Internet, we survey the state of a new field of enquiry in developmental psychology. This field is important because developmentalists need to understand how children and adolescents live in a new, massive, and complex virtual universe, even as they carry on their lives in the real world. We have selected six empirical articles to showcase various aspects of child and adolescent development in this virtual universe. These articles reflect three major themes of this new field: the Internet. Encompassing the broad areas of cognitive and social development, these articles address a number of different specific developmental functions. Yan analyzes the factors influencing the development of an understanding of the Internet in both its technical and social dimensions. Jackson et al. demonstrate the positive impact of home Internet access on the reading achievement of low-income, mostly African American children. In the arena of social development, articles deal with five important foci of adolescent development: identity (Subrahmanyam et al.); self-worth...
Words: 3437 - Pages: 14
...on the information in the text sheet and in your assigned reading for this week, discuss the following scenarios and determine which type of forensic analysis technique(s) should be used, and why: 1. The Federal Trade Commission disclosed a law suit against unknown credit card fraudsters. Over 15 companies were being run by "money mules," people who transfer stolen goods or money from one country to another. The money mules were recruited via a spam e-mail message. E-mail forensics—The study of the source and content of e-mail as evidence. E-mail forensics includes the process of identifying the sender, recipient, date, time, and origination location of an e-mail message. You can use e-mail forensics to identify harassment, discrimination, or unauthorized activities. There is also a body of laws that deal with retention and storage of e-mails that are specific to certain fields, such as financial and medical. Disk forensics—The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives, smartphones, GPS systems, and removable media. Disk forensics includes both the recovery of hidden and deleted information and also the process of identifying who created a file or message. Memory & Cache, Temporary File System (i.e., swap & .tmp files) Disks and local logs (i.e., event logs), Remote log, Archived data (i.e., disks, USB drives,...
Words: 951 - Pages: 4
...simple solution. Anyone who is concerned with the protection of their computer, data, or network needs to be ready to spend time researching their specific needs to protect all the different layers and domains that can be attacked. The areas that need the most attention are port scanning, protocol analysis, vulnerability tests, intrusion prevention, firewall use, VPN security, internet filtering, and password recovery. Users need to become proactive when it comes to their network’s security by knowing what tools are the best for the job and being able to implement these tools quickly and correctly. Port Scanning Port scanning and IP scanning is an important step towards network security. A port scanner checks for available virtual ports on your network and can identify if they are open or closed. Finding out which ports are open allows network administrators to take appropriate protective actions by closing or blocking traffic to and from those open (Network Security Tools, 2013). Nmap is the major tool of choice for most network administrators. It is an affordable choice because it is a free open source tool. Nmap supports most operating systems and comes in wither a traditional command line interface or GUI version (Nmap, 2013). Nmap works by using raw IP packets to check what hosts are on a network. Nmap will find out what services are on those hosts a give the name of the application and version. Nmap can also see which OS and version the system is running as well as...
Words: 1657 - Pages: 7
...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Analyzing Man-in-the-Browser (MITB) Attacks The Matrix is real and living inside your browser. How do you ask? In the form of malware that is targeting your financial institutions. Though, the machines creating this malware do not have to target the institution, rather your Internet browser. By changing what you see in the browser, the attackers now have the ability to steal any information that you enter and display whatever they choose. This has become known as the Man-in-the-Browser (MITB) attack. AD Copyright SANS Institute Author Retains Full Rights Analyzing Man in the Browser Attacks | 1 Analyzing Man-in-the-Browser (MITB) Attacks GIAC (GCFA) Gold Certification Author: Chris Cain, cicain08@gmail.com Advisor: Dominicus Adriyanto Accepted: December 22nd 2014 Abstract The Matrix is real and living inside your browser. How do you ask? In the form of malware that is targeting your financial institutions. Though, the machines creating this malware don’t have to target the institution, rather your Internet browser. By changing what you see in the browser, the attackers now have the ability to steal any information that you enter and display whatever they choose. This has become known as the Man-in-the-Browser (MITB) attack. No one is safe from ...
Words: 5973 - Pages: 24
...The Internet of Things 1. Summarize what have you learnt about Industry 4.0 (The Internet of Thing) As the Internet of Things, most of organizations try to find and use lots of information from many sources such as internal and external sources, including public, suppliers, and internet in order to analyze and evaluate the projects. As the Internet, it is the most easiest and effective ways to get information or databases to analyze the efficiency of projects or operations for increasing the logistic of industries. Using internet system, it is the new challenge that most of companies adapt it in order to become successful. As the internet of things, it is the new strategy for applying with business models that how business can use technology to increase profitability and efficiency of business’ operation. There are two main types of emerging applications, including information and analysis, and automation and control as the tools for develop and improve technology to increase values and opportunities’ companies. As Information and Analysis, it is using networks to collect and link all information and data among consumers and producers for gaining and improving decision making of organization or management processes of production. There are three applications of information and analysis, which consists of tracking behavior, enhanced situational awareness, and sensor-driven decision analytics. Tracking behavior, it is using tracking product to identify details, status, and...
Words: 883 - Pages: 4
...solve the problem there are certain steps I must follow to find the right solutions. I have to gather information, analyze that information, evaluate the information and then apply that information to solve the problem (Carter, Bishop, & Kravits, 2007). Path to Solution Gathering Information The first step in developing a solution to the problem is to gather information. That said, there are things to consider when gather this information. The amount of information needed, the length of time to utilize finding information, and determining the pertinence of the information, are all questions necessary to answer prior to searching for supportive material (Carter, et al., 2007). There are two main sources for me to find the necessary information. The internet is filled with a wealth of information and by using different search engines and different combinations of words, I am sure to find what I am looking for. A resource, that is quite reliable, and on every Army installation, is Army Community Service (ACS). ACS provides services ranging from relocation assistance to teaching new Soldiers and their families how to budget. Their deployment assistance center will be the most valuable service in solving my problem. Information Evaluation...
Words: 808 - Pages: 4
...and methods of evaluation of online information through two similar approaches. It does not compare and it does not suggest better way of evaluation either. However, it raises the importance of evaluation but it is up to the reader himself/herself what will do with information covered here. Introduction The World Wide Web provides information from all around the world. There is extremely wide variety of material, different in its reliability, accuracy and value. No one has to approve the content before publishing like in more traditional form (books or magazines) and everyone can publish. Internet by its nature was designed to provide unrestricted information. There are no rules or standards as far as quality of information which writer can put on the internet are concerned. This information can be found in a large variety of kinds and was created for different purposes. Each of these different kinds and purposes has various levels of quality, credibility and reliability. Purpose of this report is to discuss how to assess validity of online information and most appropriate methods of evaluation. Discussion 1. Why to evaluate online information The nature of the web itself and the fact that anyone can publish or even change content of some websites means that excellent resources reside along the most dubious and these are the reasons why there is a need for evaluation. The main reasons why to evaluate...
Words: 2060 - Pages: 9
...and methods of evaluation of online information through two similar approaches. It does not compare and it does not suggest better way of evaluation either. However, it raises the importance of evaluation but it is up to the reader himself/herself what will do with information covered here. Introduction The World Wide Web provides information from all around the world. There is extremely wide variety of material, different in its reliability, accuracy and value. No one has to approve the content before publishing like in more traditional form (books or magazines) and everyone can publish. Internet by its nature was designed to provide unrestricted information. There are no rules or standards as far as quality of information which writer can put on the internet are concerned. This information can be found in a large variety of kinds and was created for different purposes. Each of these different kinds and purposes has various levels of quality, credibility and reliability. Purpose of this report is to discuss how to assess validity of online information and most appropriate methods of evaluation. Discussion 1. Why to evaluate online information The nature of the web itself and the fact that anyone can publish or even change content of some websites means that excellent resources reside along the most dubious and these are the reasons why there is a need for evaluation. The main reasons why to evaluate...
Words: 2051 - Pages: 9
...Analyzing a Web Page BSHS/352 November 22, 2011 How to Properly Analyze a Web Page At the click of a button, a person is able to search the internet for what he or she needs. In the past 25 years, the internet has hit the largest boom that has yet to be seen on planet earth. The internet is a handy tool that allows a person to access any information he or she desires effortlessly, with little to no cost, depending upon what the person is looking for. The key to using the internet is to understand its purpose and what the site is trying to provide. Not everything that is on the web is legit or trustworthy; this is why it is important to really analyze the website thoroughly before taking too many actions. In today’s paper, I will be analyzing a specific web page and discussing my findings. I will also be discussing the value and relevance of this site to clients or human services agencies. How to Evaluate a Website According to Widener University, there are different ways to evaluate a website. “When evaluating a website, a person should check for: authority, accuracy, currency, and objectivity” (www.widener.com). Websites are generated with several domains such as gov, edu, org and com. Unlike most sources, the internet is unfiltered. If there is any question whether or not the website is legit, then there is a slight chance that it may not be. There is slim to none on the control of what is being posted over the internet, so virtually anyone can create a website...
Words: 644 - Pages: 3